SlideShare a Scribd company logo
Introduction
 Quantum Cryptography is an effort to allow two users of a common communication channel
to create a body of shared and secret information. This information, which generally takes the
form of a random string of bits, can then be used as a conventional secret key for secure
communication.
 The Heisenberg Uncertainty principle and quantum entanglement can be exploited in as
system of secure communication often referred to as “quantum Cryptography”.
Heisenberg uncertainty principle : states that certain pairs of physical
properties are related in such a way that measuring one property
prevents the observer from simultaneously knowing the value for other.
Principle of photon polarization: tells that an eavesdropper cannot copy
unknown Qubits due to non-cloning algorithm.
 Photon :--It is the elementary particle responsible for
electromagnetic phenomena. It is the carrier of electromagnetic
radiations.
 Quantum entanglement :--It is a physical resource like energy. It can
be measured, transformed and purified.
History
In the early 1970 Stephen Wiesner, firstly introduced the concept of
quantum conjugate coding in New York.
His seminal paper titled "Conjugate Coding" was rejected by IEEE
Information Theory but was eventually published in 1983 in SIGACT
News (15:1 pp. 78-88, 1983).
A decade later, Charles H. Bennett, of the IBM Thomas J. Watson
Research Center, and Gilles Brassard, of the Université de Montréal,
proposed a method for secure communication based on Wiesner’s
“conjugate observables”.
In 1990, Artur Ekert, then a Ph.D. student of Oxford University,
developed a different approach to quantum cryptography known as
quantum entanglement.
 Classical Cryptography relies heavily on the complexity of factoring
integers.
 Quantum Computers can use Shor’s Algorithm to efficiently break
today’s cryptosystems.
 We need a new kind of cryptography!
Need of Quantum Cryptography
KEY DISTRIBUTION
Alice and Bob first agree on two representations for
ones and zeroes
One for each basis used, {,}
and {, }.
This agreement can be done in public
Define
1 =  0 = 
1 =  0 = 
KEY DISTRIBUTION
KEY DISTRIBUTION
Alice sends a sequence of photons to Bob.
Each photon in a state with polarization corresponding to 1 or 0, but with
randomly chosen basis.
Bob measures the state of the photons he receives, with each state measured
with respect to randomly chosen basis.
Alice and Bob communicates via an open channel. For each photon, they reveal
which basis was used for encoding and decoding respectively. All photons which
has been encoded and decoded with the same basis are kept, while all those
where the basis don't agree are discarded
EAVESDROPPING
Eve has to randomly select basis for her measurement
Her basis will be wrong in 50% of the time.
Whatever basis Eve chose she will measure 1 or 0
When Eve picks the wrong basis, there is 50% chance that she'll measure the right
value of the bit
E.g. Alice sends a photon with state corresponding to 1 in the {,}
basis. Eve picks the {, } basis for her measurement which this time happens to
give a 1 as result, which is correct.
EXAMPLE OF KEY DISTRIBUTION
Alice’s
basis
Alice’s
bit
Alice’s
photon
Eve’s
basis
Correct Eve’s
photon
Eve’s
bit
Correct
{,}
1 
{,} Yes  1 Yes
{, } No  1 Yes
 0 No
0 
{,} Yes  0 Yes
{, } No  1 No
 0 Yes
{, }
1 
{,} No  1 Yes
 0 No
{, } Yes  1 Yes
0 
{,} No  1 No
 0 Yes
{, } yes  0 Yes
EVES PROBLEM
Eve has to re-send all the photons to Bob
Will introduce an error, since Eve don't know the correct basis used
by Alice
Bob will detect an increased error rate
Still possible for Eve to eavesdrop just a few photons, and hope that
this will not increase the error to an alarming rate. If so, Eve would
have at least partial knowledge of the key.
NOISE
Noise might introduce errors
A detector might detect a photon even though there are no photons
Solution:
 Send the photons according to a time schedule.
 Then Bob knows when to expect a photon, and can discard those that
doesn't fit into the scheme's time window.
There also has to be some kind of error correction in the over all process.
ERROR CORRECTION
Alice and Bob agree on a random permutation of the bits in the key
They split the key into blocks of length k
Compare the parity of each block. If they compute the same parity, the block
is considered correct. If their parity is different, they look for the erroneous bit,
using a binary search in the block. Alice and Bob discard the last bit of each
block whose parity has been announced
This is repeated with different permutations and block size, until Alice and
Bob fail to find any disagreement in many subsequent comparisons
ATTACKS
• In Quantum Cryptography, traditional man-in-the-middle
attacks are impossible due to the Observer Effect.
• If Alice and Bob are using an entangled photon system, then it
is virtually impossible to hijack these, because creating three
entangled photons would decrease the strength of each
photon to such a degree that it would be easily detected.
ADVANTAGES:
 The biggest advantage of public key cryptography is the
secure nature of the private key. In fact, it never needs to be
transmitted or revealed to anyone.
It enables the use of digital certificates and digital timestamps,
which is a very secure technique of signature authorization.
DISADVANTAGES:
Transmission time for documents encrypted using public key
cryptography are significantly slower then symmetric
cryptography. In fact, transmission of very large documents is
prohibitive.
The key sizes must be significantly larger than symmetric
cryptography to achieve the same level of protection.
CONCLUSION
Quantum cryptography is a major achievement in security
engineering.
As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry!

More Related Content

What's hot

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Priya Winsome
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
IEEEP Karachi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sreekanth Narendran
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
nit jalandhar
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
AliceBob EveMallory
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
Kirby Linvill
 
Report_amit
Report_amitReport_amit
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
Andrew Manoske
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Vishnu Pendyala
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Information Security Awareness Group
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 

What's hot (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
Report_amit
Report_amitReport_amit
Report_amit
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 

Viewers also liked

Quantum communication in space
Quantum communication in spaceQuantum communication in space
Quantum communication in space
Swapnil Gourkar
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
Yi-Hsueh Tsai
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Omar Shehab
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
Ferro Demetrio
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
harpoo123143
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
Imesha Perera
 
Cryptography
CryptographyCryptography
Cryptography
gueste4c97e
 
Cryptography
CryptographyCryptography
Cryptography
Darshini Parikh
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
IOSR Journals
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Viewers also liked (14)

Quantum communication in space
Quantum communication in spaceQuantum communication in space
Quantum communication in space
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Report Cryptography
Report CryptographyReport Cryptography
Report Cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Quantum

Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
H0324143
H0324143H0324143
H0324143
iosrjournals
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
 
1808.03183
1808.031831808.03183
1808.03183
Christos Loizos
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
Himanshu Shekhar
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
IOSR Journals
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
MTufail10
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
hienlmgm
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Basundhara Deb Basundhara
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
arankaila
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
ijcisjournal
 
B03250609
B03250609B03250609
B03250609
theijes
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
ijcisjournal
 
20111123 dce-figueres
20111123 dce-figueres20111123 dce-figueres
20111123 dce-figueres
Miquel Duran
 

Similar to Quantum (20)

Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
H0324143
H0324143H0324143
H0324143
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
1808.03183
1808.031831808.03183
1808.03183
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
B03250609
B03250609B03250609
B03250609
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
 
20111123 dce-figueres
20111123 dce-figueres20111123 dce-figueres
20111123 dce-figueres
 

Recently uploaded

原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
yqqaatn0
 
molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
Anagha Prasad
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
muralinath2
 
Medical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptxMedical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptx
terusbelajar5
 
Eukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptxEukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptx
RitabrataSarkar3
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
İsa Badur
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
PRIYANKA PATEL
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
Sérgio Sacani
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
Daniel Tubbenhauer
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
SSR02
 
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốtmô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
HongcNguyn6
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
TinyAnderson
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
moosaasad1975
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
David Osipyan
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
University of Maribor
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
RASHMI M G
 
20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx
Sharon Liu
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
University of Maribor
 
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
Sérgio Sacani
 
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero WaterSharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Texas Alliance of Groundwater Districts
 

Recently uploaded (20)

原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
原版制作(carleton毕业证书)卡尔顿大学毕业证硕士文凭原版一模一样
 
molar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptxmolar-distalization in orthodontics-seminar.pptx
molar-distalization in orthodontics-seminar.pptx
 
Oedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptxOedema_types_causes_pathophysiology.pptx
Oedema_types_causes_pathophysiology.pptx
 
Medical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptxMedical Orthopedic PowerPoint Templates.pptx
Medical Orthopedic PowerPoint Templates.pptx
 
Eukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptxEukaryotic Transcription Presentation.pptx
Eukaryotic Transcription Presentation.pptx
 
aziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobelaziz sancar nobel prize winner: from mardin to nobel
aziz sancar nobel prize winner: from mardin to nobel
 
ESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptxESR spectroscopy in liquid food and beverages.pptx
ESR spectroscopy in liquid food and beverages.pptx
 
The binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defectsThe binding of cosmological structures by massless topological defects
The binding of cosmological structures by massless topological defects
 
Equivariant neural networks and representation theory
Equivariant neural networks and representation theoryEquivariant neural networks and representation theory
Equivariant neural networks and representation theory
 
Nucleophilic Addition of carbonyl compounds.pptx
Nucleophilic Addition of carbonyl  compounds.pptxNucleophilic Addition of carbonyl  compounds.pptx
Nucleophilic Addition of carbonyl compounds.pptx
 
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốtmô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
mô tả các thí nghiệm về đánh giá tác động dòng khí hóa sau đốt
 
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdfTopic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
Topic: SICKLE CELL DISEASE IN CHILDREN-3.pdf
 
What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.What is greenhouse gasses and how many gasses are there to affect the Earth.
What is greenhouse gasses and how many gasses are there to affect the Earth.
 
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
3D Hybrid PIC simulation of the plasma expansion (ISSS-14)
 
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...
 
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptx
 
20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx20240520 Planning a Circuit Simulator in JavaScript.pptx
20240520 Planning a Circuit Simulator in JavaScript.pptx
 
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
 
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
EWOCS-I: The catalog of X-ray sources in Westerlund 1 from the Extended Weste...
 
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero WaterSharlene Leurig - Enabling Onsite Water Use with Net Zero Water
Sharlene Leurig - Enabling Onsite Water Use with Net Zero Water
 

Quantum

  • 1. Introduction  Quantum Cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.  The Heisenberg Uncertainty principle and quantum entanglement can be exploited in as system of secure communication often referred to as “quantum Cryptography”.
  • 2. Heisenberg uncertainty principle : states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value for other. Principle of photon polarization: tells that an eavesdropper cannot copy unknown Qubits due to non-cloning algorithm.  Photon :--It is the elementary particle responsible for electromagnetic phenomena. It is the carrier of electromagnetic radiations.  Quantum entanglement :--It is a physical resource like energy. It can be measured, transformed and purified.
  • 3. History In the early 1970 Stephen Wiesner, firstly introduced the concept of quantum conjugate coding in New York. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78-88, 1983). A decade later, Charles H. Bennett, of the IBM Thomas J. Watson Research Center, and Gilles Brassard, of the Université de Montréal, proposed a method for secure communication based on Wiesner’s “conjugate observables”. In 1990, Artur Ekert, then a Ph.D. student of Oxford University, developed a different approach to quantum cryptography known as quantum entanglement.
  • 4.  Classical Cryptography relies heavily on the complexity of factoring integers.  Quantum Computers can use Shor’s Algorithm to efficiently break today’s cryptosystems.  We need a new kind of cryptography! Need of Quantum Cryptography
  • 5. KEY DISTRIBUTION Alice and Bob first agree on two representations for ones and zeroes One for each basis used, {,} and {, }. This agreement can be done in public Define 1 =  0 =  1 =  0 = 
  • 7. KEY DISTRIBUTION Alice sends a sequence of photons to Bob. Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded
  • 8. EAVESDROPPING Eve has to randomly select basis for her measurement Her basis will be wrong in 50% of the time. Whatever basis Eve chose she will measure 1 or 0 When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the {,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.
  • 9. EXAMPLE OF KEY DISTRIBUTION
  • 10. Alice’s basis Alice’s bit Alice’s photon Eve’s basis Correct Eve’s photon Eve’s bit Correct {,} 1  {,} Yes  1 Yes {, } No  1 Yes  0 No 0  {,} Yes  0 Yes {, } No  1 No  0 Yes {, } 1  {,} No  1 Yes  0 No {, } Yes  1 Yes 0  {,} No  1 No  0 Yes {, } yes  0 Yes
  • 11. EVES PROBLEM Eve has to re-send all the photons to Bob Will introduce an error, since Eve don't know the correct basis used by Alice Bob will detect an increased error rate Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.
  • 12. NOISE Noise might introduce errors A detector might detect a photon even though there are no photons Solution:  Send the photons according to a time schedule.  Then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. There also has to be some kind of error correction in the over all process.
  • 13. ERROR CORRECTION Alice and Bob agree on a random permutation of the bits in the key They split the key into blocks of length k Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons
  • 14. ATTACKS • In Quantum Cryptography, traditional man-in-the-middle attacks are impossible due to the Observer Effect. • If Alice and Bob are using an entangled photon system, then it is virtually impossible to hijack these, because creating three entangled photons would decrease the strength of each photon to such a degree that it would be easily detected.
  • 15. ADVANTAGES:  The biggest advantage of public key cryptography is the secure nature of the private key. In fact, it never needs to be transmitted or revealed to anyone. It enables the use of digital certificates and digital timestamps, which is a very secure technique of signature authorization.
  • 16. DISADVANTAGES: Transmission time for documents encrypted using public key cryptography are significantly slower then symmetric cryptography. In fact, transmission of very large documents is prohibitive. The key sizes must be significantly larger than symmetric cryptography to achieve the same level of protection.
  • 17. CONCLUSION Quantum cryptography is a major achievement in security engineering. As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry!

Editor's Notes

  1. A schedule design for optional periods of time/objectives.