SlideShare a Scribd company logo
Quantum Cryptography
Presented By -
Swasat Dutta
Gau-C-15/L-381
B.Tech 7th Sem
Cryptography
Crypto ā€“ Secret
Graphy ā€“ Writing
ā— In Symmetric cryptography same key is used for encyption and
decryption . If key is leaked then communication is not secured.
ā— In Asymmetric cryptography , keys used are at least 128-bit keys which
are considered to be very strong .To generate a private key for that
public key involves huge amounts of calculations.
WHY DO WE NEED QUANTUM CRYPTOGRAPHY
ā— Quantum cryptography has a different way of sending the key to the
receiver. It uses photons to send a key .
ā— Polarization - The ability of waves to oscillate in more than one
direction
Quantum Cryptography
0
01
1
Diagonal
Polarization mode
Rectilinear
Polarization mode
The Quantum Cryptosystem : Basic Operation
1. ā€œAliceā€ prepares a series of photons with random polarizations ā€“ either 45,
90, 135, or 180 degrees. She sends these photons to ā€œBobā€ over a quantum
channel.
2. Bob measures the photons. He randomly chooses a filter by which to
measure the incoming photons, and records which filter he used. If he
measures 45 or 90 degrees, a 0 bit is recorded; if he measures 135 or 180
degrees, a 1 bit is recorded.
3. Using a normal, unsecured channel, Alice and Bob communicate to find
which bits Bob used the correct filter for. These values are now become a
secret key between Alice and Bob.
4. Error correction processes performed by Alice and Bob .
Key-1 0 0 1 0 1 00 Key-1 0 0 1 0 1 00
ALICE BOB
Detecting an Eavesdropper
ā— Heisenbergā€™s uncertainty principle states that it is impossible to measure
together the speed and position of a particle with highest accuracy, and its
state will change when measured.
ā— Measuring one variable will necessarily affect the other. Polarization
properties of light fall into this category, therefore, an interloper who is trying
to intercept and measure the optical signal will invariably affect the system in
a such a way that their interference will be noticed.
Conclusion
Privacy and data security is right now of utmost importance to
people. With quantum cryptography, secure transmission of data is
possible, and chances of it being intercepted and altered are very low.
This technology has been implemented in some areas. But is still under
deeper research before being widely implemented.
References
ā— www.studymafia.org
ā— www.technologyreview.com
ā— www.seminarsonly.com
ā— www.popsci.com
THANK YOU

More Related Content

What's hot

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
Ā 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptographyShivangi Saxena
Ā 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
Ā 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
Shahrikh Khan
Ā 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
Ruwan Ranganath
Ā 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
Ā 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
NARESHGOTMAL
Ā 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
Ā 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
Ā 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
Ā 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
Ā 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
Fatemeh Ghezelbash
Ā 

What's hot (20)

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
Ā 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
Ā 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
Ā 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
Ā 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
Ā 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Ā 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Ā 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Ā 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Ā 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
Ā 

Similar to Quantum Cryptography

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Basundhara Deb Basundhara
Ā 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
Ā 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
Ā 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
ssuser6602e0
Ā 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
Ā 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Information Security Awareness Group
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sreekanth Narendran
Ā 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
Ā 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
Ā 
B03250609
B03250609B03250609
B03250609
theijes
Ā 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
Ā 
Quantum
QuantumQuantum
Quantum
saba majeed
Ā 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
Rare Input
Ā 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
Ā 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
Ā 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
Ā 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
Himanshu Shekhar
Ā 

Similar to Quantum Cryptography (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Ā 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Ā 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
Ā 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
Ā 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Ā 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
Ā 
B03250609
B03250609B03250609
B03250609
Ā 
1914 1917
1914 19171914 1917
1914 1917
Ā 
1914 1917
1914 19171914 1917
1914 1917
Ā 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
Ā 
Quantum
QuantumQuantum
Quantum
Ā 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
Ā 
Ad26188191
Ad26188191Ad26188191
Ad26188191
Ā 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
Ā 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
Ā 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Ā 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
Ā 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
Ā 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
UiPathCommunity
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
Ā 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Ā 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Ā 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Ā 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ā 
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder ā€“ active learning and UiPath LLMs for do...
Ā 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Ā 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Ā 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Ā 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Ā 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Ā 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Ā 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Ā 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Ā 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Ā 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Ā 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Ā 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Ā 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Ā 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Ā 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Ā 

Quantum Cryptography

  • 1. Quantum Cryptography Presented By - Swasat Dutta Gau-C-15/L-381 B.Tech 7th Sem
  • 3.
  • 4.
  • 5. ā— In Symmetric cryptography same key is used for encyption and decryption . If key is leaked then communication is not secured. ā— In Asymmetric cryptography , keys used are at least 128-bit keys which are considered to be very strong .To generate a private key for that public key involves huge amounts of calculations. WHY DO WE NEED QUANTUM CRYPTOGRAPHY
  • 6. ā— Quantum cryptography has a different way of sending the key to the receiver. It uses photons to send a key . ā— Polarization - The ability of waves to oscillate in more than one direction Quantum Cryptography 0 01 1 Diagonal Polarization mode Rectilinear Polarization mode
  • 7. The Quantum Cryptosystem : Basic Operation 1. ā€œAliceā€ prepares a series of photons with random polarizations ā€“ either 45, 90, 135, or 180 degrees. She sends these photons to ā€œBobā€ over a quantum channel. 2. Bob measures the photons. He randomly chooses a filter by which to measure the incoming photons, and records which filter he used. If he measures 45 or 90 degrees, a 0 bit is recorded; if he measures 135 or 180 degrees, a 1 bit is recorded. 3. Using a normal, unsecured channel, Alice and Bob communicate to find which bits Bob used the correct filter for. These values are now become a secret key between Alice and Bob. 4. Error correction processes performed by Alice and Bob .
  • 8. Key-1 0 0 1 0 1 00 Key-1 0 0 1 0 1 00 ALICE BOB
  • 9. Detecting an Eavesdropper ā— Heisenbergā€™s uncertainty principle states that it is impossible to measure together the speed and position of a particle with highest accuracy, and its state will change when measured. ā— Measuring one variable will necessarily affect the other. Polarization properties of light fall into this category, therefore, an interloper who is trying to intercept and measure the optical signal will invariably affect the system in a such a way that their interference will be noticed.
  • 10. Conclusion Privacy and data security is right now of utmost importance to people. With quantum cryptography, secure transmission of data is possible, and chances of it being intercepted and altered are very low. This technology has been implemented in some areas. But is still under deeper research before being widely implemented.