SlideShare a Scribd company logo
Seminar on Elements of Cryptography
CSE-6504
Presented by
Anisur Rahman
M Shahedul Islam
Nazmul Hasan
Supervisor
Prof. Dr. Md. Mahbubur Rahman
Quantum Cryptography
Alice
Bob
Eve
Sequence
• Cryptology – General View
• Quantum Cryptography - How it came up
• Theoretical Background
• History of Quantum Cryptography (QC)
• Quantum Key Distribution Protocol - BB84
• Quantum Key Distribution – Example
• Attack and Vulnerabilities
• Main Contribution of QC
• Security of QC
• State of the QC Technology
• Pros and Cons
Cryptology – General View
 Cryptography is the art of devising codes and
ciphers.
 Crypto analysis is the art of breaking them.
 Cryptology is the combination of the two i. e
Cryptography and Crypto analysis
Cryptology – General View
• Need
– > Secure Communication
– > Secure Data Transmission
• Two techniques
– Symmetric - key encryption (shared key)
• Key - distribution problem
– Asymmetric - key encryption (pair of public &
secret keys)
• Success based on hardware limitations, absence of
good algorithms
Cryptology – General View
Symmetrical (secret-key) cryptosystems:
- only provably secure cryptosystem known today
- not handy, key as long as message
- key only valid for one transmission
- how to send the key in a secure manner?
M: 1 0 1 0 1 0 1 0
K: 1 0 0 0 1 1 1 0
S: 0 0 1 0 0 1 0 0
Distribute key over secure channel
MM S
S: 0 0 1 0 0 1 0 0
K: 1 0 0 0 1 1 1 0
M: 1 0 1 0 1 0 1 0
XOR XOR
Cryptology – General View
Asymmetrical (public-key) cryptosystems:
- First implementation of RSA in 1978
- Very convenient, Internet
- Idea is based on computational complexity
- rely on unproven assumptions
Private Public
MessageMessage Encrypted message
Cryptology – General View
Quantum Cryptography - How it came up
 Quantum Cryptography is an effort to allow two users
of a common communication channel to create a body
of shared and secret information. This information,
which generally takes the form of a random string of
bits, can then be used as a conventional secret key for
secure communication.
 Quantum cryptography is the science of exploiting
quantum mechanical properties to perform
cryptographic tasks.
 The best known example of quantum cryptography is
quantum key distribution which offers an information-
theoretically secure solution to the key exchange
problem.
Theoretical Background
 Quantum Key Distribution (QKD) uses quantum mechanics
to guarantee secure communication. It enables two parties to
produce a shared random secret key known only to them,
which can then be used to encrypt and decrypt messages. It
is often called quantum cryptography
 An important and unique property of quantum key distribution
is the ability of the two communicating users to detect the
presence of any third party trying to gain knowledge of the
key.
 Quantum - minimum amount of any physical entity
 Photon Polarization - Quantum Superposition
 2 orthogonal states:
1. Vertical-Horizontal
2. Diagonal +- 45 degrees
Filter to distinguish
polarized photons
Correct Filter
applied
Wrong Filter
applied
Theoretical Background
• PBS – Photon Beam Splitter
Theoretical Background
• The Heisenberg Uncertainty Principle states that we
do not know exactly what will happen to each individual
photon, for in the act of measuring its behavior, it alters
its properties. That means - “observation causes
perturbation”
• The no-cloning theorem states that it is impossible to
create an identical copy of an arbitrary unknown
quantum state.
• Quantum entanglement is a physical phenomenon that
occurs when pairs or groups of particles are generated
or interact in ways such that the quantum state of each
particle cannot be described independently — instead, a
quantum state may be given for the system as a whole.
Theoretical Background
The Heisenberg Uncertainty principle, no-
cloning theorem and quantum
entanglement can be exploited for secured
communication in quantum Cryptography.
Theoretical Background
History of Quantum Cryptography
• Stephen Wiesner – early 1970s wrote paper "Conjugate
Coding”
• Paper by Charles Bennett and Gilles Brassard in 1984 is
the basis for Quantum Key Distribution (QKD) protocol
BB84. Prototype developed in 1991
• Another QKD protocol was invented independently by
Artur Ekert in 1991
Quantum Key Distribution Protocol - BB84
• First quantum cryptography protocol
• Goal: describe a scheme of two users who want
to communicate and exchange data securely.
• Idea: distribute a key securely, based on the laws
of physics.
• Security proofs:
– If someone reads the state of photon -> state
changes○ Not possible to copy the photon in order to
encode it with
– all possible ways (basis)
Quantum Key Distribution - Example
Step-1 :
To begin creating a key, Alice sends a photon
through either ‘0’ or ‘1’ slot of the rectilinear or
diagonal polarizing filters, while making a
record of previous orientations
Step- 2 :
For each incoming bit, Bob chooses randomly which filter
slot he uses for detection and writes down both the
polarization and bit values.
Quantum Key Distribution - Example
Step- 3 :
If Eve, the eavesdropper, tries to spy on the train of photons,
quantum mechanics prohibits her from using both filters to
detect the orientation of a photon. If she chooses the wrong
filter, she may create errors by modifying their polarization.
If Eve has intruded the
communication, she will
DEFINITELY left some traces due to
Heisenberg Uncertainty Principle
(HUP) and non cloning theorem
Quantum Key Distribution - Example
Step- 4 :
After all the photons have reached Bob, he tells Alice over
public channel (telephone, email) the sequence of filters he
used for the incoming photon but not the bit values of
photons.
Quantum Key Distribution - Example
Step- 5 :
Alice tells Bob during the same conversation which filter she
chose correctly. Those instances constitute the bits that
Alice and Bob will use to form the key that they will use to
encrypt message.
Key : 0 0 1 1 1
Quantum Key Distribution - Example
ATTACKS
• In Quantum Cryptography, traditional
man-in-the-middle attacks are impossible due to
the Observer Effect
• If Alice and Bob are using an entangled photon
system, then it is virtually impossible to hijack
these, because creating entangled photons
would be easily detected
Vulnerabilities - Photon Number attack
Cause
• If more than one photon for each bit is sent
– Eve can steal extra photons to extract the stolen
photons information
Measure
• Ensure photon splitter only sends exactly ONE
photon at each time
• Single photon ensures quantum mechanic laws are
satisfied
Vulnerabilities - Spectral attack
Cause
• If photons are created by DIFFERENT laser photo
diodes, they have different spectral characteristics.
– Eve performs spectral attack by measuring COLOR,
and not polarization
Measure
Use single laser photo diode
Vulnerabilities – Random Numbers
Cause
• Are our random numbers really "Random"?
• Bob side, randomness is determined by Beam Splitter
• Alice side, randomness if a bit stream cannot be proven
mathematically
– "random" sequences by following specific patterns,
Algorithms generate NOT that random!
– Eve can use same algorithm to extract information
Measure
Entangled Photon
Pairs comes to the
rescue
(discussed in theoretical
background)
Vulnerabilities – Fake State Attack
Measure
• One possible solution - apply classical cryptography to ensure the
message’s authenticity.
• Another solution - uses trusted certificates created by quantum
mechanics
FSG: Fake State Generator
Noise
• Noise might introduce errors
• A detector might detect a photon even though there are
no photons
• Solution:
– send the photons according to a time schedule.
– then Bob knows when to expect a photon and can
discard those that doesn't fit into the scheme's time
window
Privacy Amplification
• Eve might have partial knowledge of the key
• Suppose there are n bits in the key and Eve has
knowledge of m bits.
• Alice randomly chose a hash function where
h(x): {0,1}n  {0,1} n-m-s
• Reduces Eve's knowledge of the key to 2–s / ln2 bits
Main Contribution of Quantum
Cryptography
• It solved the key distribution problem
• Once key is securely received it can be
used to encrypt/decrypt messages
transmitted by conventional channels
Security of Quantum Key
Distribution
• Quantum cryptography obtains its fundamental
security from the fact that
– each qubit is carried by a single photon, and
– each photon will be altered as soon as it is read
• This makes impossible to intercept message
without being detected
Security of Quantum Cryptography
• Eavesdropping on quantum signals can be detected
• Key generated from high-fidelity entangled states is private
• Using quantum error correction, high-fidelity entanglement
can be distilled from noisy entanglement
• “Prepare and measure” quantum key distribution,
augmented by error correction and privacy amplification is
secure (against any attack) if the bit error rate is low
• Quantum technologies are available today
• Other areas in quantum cryptography: digital signatures,
coin flipping, data hiding, etc
• Experimental implementations going on since
1990
• In 2004, QC is performed over distances of
30-40 km using optical fiber
• In general we need two capabilities:
(1)Single photon gun
(2) Being able to measure single photons
State of the Quantum
Cryptography Technology
Working Prototypes
• Quantum cryptography has been tried
experimentally over
– fibre-optic cables and,
– more recently, open air (23km)
RIGHT: The first prototype
implementation of quantum
cryptography
(IBM, 1989)
Pros & Cons
• Nearly Impossible to
steal
• Detect if someone is
listening
• “Secure”
• Distance Limitations
• Availability
– vulnerable to DOS
– keys can’t keep up with
plaintext
Future Scope (Prospects)
• The experiments suggests transmission to satellites
is possible, due to the lower atmospheric density at
higher altitudes
• The current commercial systems are aimed mainly at
governments and corporations with high security
requirements
• Factors preventing wide adoption of quantum
cryptography outside high security areas include the
cost of equipment, and the lack of a demonstrated
threat to existing key exchange protocols
CONCLUSION
 QKD systems are unconditionally secure, based on
the fundamental laws of physics
 However, physical realisations of those systems
violate some of the assumptions of the security
proof
 Eavesdroppers may thus intercept some of the sent
messages
CONCLUSION
Quantum cryptography is a major achievement
in security engineering
As it gets implemented, it will allow perfectly
secure bank transactions, secret discussions
for government officials, and well-guarded
trade secrets for industry!
Quantum cryptography
Quantum cryptography

More Related Content

What's hot

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 

What's hot (20)

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 

Viewers also liked

Viewers also liked (10)

Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Cryptographie quantique
Cryptographie quantiqueCryptographie quantique
Cryptographie quantique
 
Quantum Computing and D-Wave
Quantum Computing and D-WaveQuantum Computing and D-Wave
Quantum Computing and D-Wave
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 

Similar to Quantum cryptography

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
ssuser6602e0
 

Similar to Quantum cryptography (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
ch07.ppt
ch07.pptch07.ppt
ch07.ppt
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
B03250609
B03250609B03250609
B03250609
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 

Recently uploaded (20)

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 

Quantum cryptography

  • 1. Seminar on Elements of Cryptography CSE-6504 Presented by Anisur Rahman M Shahedul Islam Nazmul Hasan Supervisor Prof. Dr. Md. Mahbubur Rahman
  • 3. Sequence • Cryptology – General View • Quantum Cryptography - How it came up • Theoretical Background • History of Quantum Cryptography (QC) • Quantum Key Distribution Protocol - BB84 • Quantum Key Distribution – Example • Attack and Vulnerabilities • Main Contribution of QC • Security of QC • State of the QC Technology • Pros and Cons
  • 4. Cryptology – General View  Cryptography is the art of devising codes and ciphers.  Crypto analysis is the art of breaking them.  Cryptology is the combination of the two i. e Cryptography and Crypto analysis
  • 6. • Need – > Secure Communication – > Secure Data Transmission • Two techniques – Symmetric - key encryption (shared key) • Key - distribution problem – Asymmetric - key encryption (pair of public & secret keys) • Success based on hardware limitations, absence of good algorithms Cryptology – General View
  • 7. Symmetrical (secret-key) cryptosystems: - only provably secure cryptosystem known today - not handy, key as long as message - key only valid for one transmission - how to send the key in a secure manner? M: 1 0 1 0 1 0 1 0 K: 1 0 0 0 1 1 1 0 S: 0 0 1 0 0 1 0 0 Distribute key over secure channel MM S S: 0 0 1 0 0 1 0 0 K: 1 0 0 0 1 1 1 0 M: 1 0 1 0 1 0 1 0 XOR XOR Cryptology – General View
  • 8. Asymmetrical (public-key) cryptosystems: - First implementation of RSA in 1978 - Very convenient, Internet - Idea is based on computational complexity - rely on unproven assumptions Private Public MessageMessage Encrypted message Cryptology – General View
  • 9. Quantum Cryptography - How it came up  Quantum Cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.  Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.  The best known example of quantum cryptography is quantum key distribution which offers an information- theoretically secure solution to the key exchange problem.
  • 10. Theoretical Background  Quantum Key Distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. It is often called quantum cryptography  An important and unique property of quantum key distribution is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key.  Quantum - minimum amount of any physical entity  Photon Polarization - Quantum Superposition  2 orthogonal states: 1. Vertical-Horizontal 2. Diagonal +- 45 degrees
  • 11. Filter to distinguish polarized photons Correct Filter applied Wrong Filter applied Theoretical Background
  • 12. • PBS – Photon Beam Splitter Theoretical Background
  • 13. • The Heisenberg Uncertainty Principle states that we do not know exactly what will happen to each individual photon, for in the act of measuring its behavior, it alters its properties. That means - “observation causes perturbation” • The no-cloning theorem states that it is impossible to create an identical copy of an arbitrary unknown quantum state. • Quantum entanglement is a physical phenomenon that occurs when pairs or groups of particles are generated or interact in ways such that the quantum state of each particle cannot be described independently — instead, a quantum state may be given for the system as a whole. Theoretical Background
  • 14. The Heisenberg Uncertainty principle, no- cloning theorem and quantum entanglement can be exploited for secured communication in quantum Cryptography. Theoretical Background
  • 15.
  • 16. History of Quantum Cryptography • Stephen Wiesner – early 1970s wrote paper "Conjugate Coding” • Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for Quantum Key Distribution (QKD) protocol BB84. Prototype developed in 1991 • Another QKD protocol was invented independently by Artur Ekert in 1991
  • 17. Quantum Key Distribution Protocol - BB84 • First quantum cryptography protocol • Goal: describe a scheme of two users who want to communicate and exchange data securely. • Idea: distribute a key securely, based on the laws of physics. • Security proofs: – If someone reads the state of photon -> state changes○ Not possible to copy the photon in order to encode it with – all possible ways (basis)
  • 18. Quantum Key Distribution - Example Step-1 : To begin creating a key, Alice sends a photon through either ‘0’ or ‘1’ slot of the rectilinear or diagonal polarizing filters, while making a record of previous orientations
  • 19. Step- 2 : For each incoming bit, Bob chooses randomly which filter slot he uses for detection and writes down both the polarization and bit values. Quantum Key Distribution - Example
  • 20. Step- 3 : If Eve, the eavesdropper, tries to spy on the train of photons, quantum mechanics prohibits her from using both filters to detect the orientation of a photon. If she chooses the wrong filter, she may create errors by modifying their polarization. If Eve has intruded the communication, she will DEFINITELY left some traces due to Heisenberg Uncertainty Principle (HUP) and non cloning theorem Quantum Key Distribution - Example
  • 21. Step- 4 : After all the photons have reached Bob, he tells Alice over public channel (telephone, email) the sequence of filters he used for the incoming photon but not the bit values of photons. Quantum Key Distribution - Example
  • 22. Step- 5 : Alice tells Bob during the same conversation which filter she chose correctly. Those instances constitute the bits that Alice and Bob will use to form the key that they will use to encrypt message. Key : 0 0 1 1 1 Quantum Key Distribution - Example
  • 23.
  • 24. ATTACKS • In Quantum Cryptography, traditional man-in-the-middle attacks are impossible due to the Observer Effect • If Alice and Bob are using an entangled photon system, then it is virtually impossible to hijack these, because creating entangled photons would be easily detected
  • 25. Vulnerabilities - Photon Number attack Cause • If more than one photon for each bit is sent – Eve can steal extra photons to extract the stolen photons information Measure • Ensure photon splitter only sends exactly ONE photon at each time • Single photon ensures quantum mechanic laws are satisfied
  • 26. Vulnerabilities - Spectral attack Cause • If photons are created by DIFFERENT laser photo diodes, they have different spectral characteristics. – Eve performs spectral attack by measuring COLOR, and not polarization Measure Use single laser photo diode
  • 27. Vulnerabilities – Random Numbers Cause • Are our random numbers really "Random"? • Bob side, randomness is determined by Beam Splitter • Alice side, randomness if a bit stream cannot be proven mathematically – "random" sequences by following specific patterns, Algorithms generate NOT that random! – Eve can use same algorithm to extract information Measure Entangled Photon Pairs comes to the rescue (discussed in theoretical background)
  • 28. Vulnerabilities – Fake State Attack Measure • One possible solution - apply classical cryptography to ensure the message’s authenticity. • Another solution - uses trusted certificates created by quantum mechanics FSG: Fake State Generator
  • 29. Noise • Noise might introduce errors • A detector might detect a photon even though there are no photons • Solution: – send the photons according to a time schedule. – then Bob knows when to expect a photon and can discard those that doesn't fit into the scheme's time window
  • 30. Privacy Amplification • Eve might have partial knowledge of the key • Suppose there are n bits in the key and Eve has knowledge of m bits. • Alice randomly chose a hash function where h(x): {0,1}n  {0,1} n-m-s • Reduces Eve's knowledge of the key to 2–s / ln2 bits
  • 31. Main Contribution of Quantum Cryptography • It solved the key distribution problem • Once key is securely received it can be used to encrypt/decrypt messages transmitted by conventional channels
  • 32. Security of Quantum Key Distribution • Quantum cryptography obtains its fundamental security from the fact that – each qubit is carried by a single photon, and – each photon will be altered as soon as it is read • This makes impossible to intercept message without being detected
  • 33. Security of Quantum Cryptography • Eavesdropping on quantum signals can be detected • Key generated from high-fidelity entangled states is private • Using quantum error correction, high-fidelity entanglement can be distilled from noisy entanglement • “Prepare and measure” quantum key distribution, augmented by error correction and privacy amplification is secure (against any attack) if the bit error rate is low • Quantum technologies are available today • Other areas in quantum cryptography: digital signatures, coin flipping, data hiding, etc
  • 34. • Experimental implementations going on since 1990 • In 2004, QC is performed over distances of 30-40 km using optical fiber • In general we need two capabilities: (1)Single photon gun (2) Being able to measure single photons State of the Quantum Cryptography Technology
  • 35. Working Prototypes • Quantum cryptography has been tried experimentally over – fibre-optic cables and, – more recently, open air (23km) RIGHT: The first prototype implementation of quantum cryptography (IBM, 1989)
  • 36. Pros & Cons • Nearly Impossible to steal • Detect if someone is listening • “Secure” • Distance Limitations • Availability – vulnerable to DOS – keys can’t keep up with plaintext
  • 37. Future Scope (Prospects) • The experiments suggests transmission to satellites is possible, due to the lower atmospheric density at higher altitudes • The current commercial systems are aimed mainly at governments and corporations with high security requirements • Factors preventing wide adoption of quantum cryptography outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols
  • 38. CONCLUSION  QKD systems are unconditionally secure, based on the fundamental laws of physics  However, physical realisations of those systems violate some of the assumptions of the security proof  Eavesdroppers may thus intercept some of the sent messages
  • 39. CONCLUSION Quantum cryptography is a major achievement in security engineering As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry!