SlideShare a Scribd company logo
VIGNAN’S INSTITUTE OF
MANAGEMENT AND TECHNOLOGY
FOR WOMEN
KONDAPUR(V),GHATKESAR(M),RANGAREDDY(DIST.)
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
INTRODUCTION
What is Cryptography?
 Cryptography is the art of devising codes and ciphers.
 Crypto analysis is the art of breaking them.
 Cryptology is the combination of the two i. e Cryptography
and Crypto analysis
INTRODUCTION
What is Quantum Cryptography?
 Quantum Cryptography is an effort to allow two users of a
common communication channel to create a body of
shared and secret information.
 This information, which generally takes the form of a
random string of bits, can then be used as a conventional
secret key for secure communication.
INTRODUCTION
What is Quantum Cryptography? Contd.
The Heisenberg Uncertainty principle, and quantum
entanglement can be exploited in as a system of secure
communication often referred to as “Quantum
Cryptography”.
INTRODUCTION
Quantum Entanglement:
Quantum entanglement is a physical phenomenon that
occurs when pairs or groups of particles are generated or
interact in ways such that the quantum state of each
particle cannot be described independently of the others,
even when the particles are separated by a large distance—
instead, a quantum state must be described for the system
as a whole.
CRYPTOGRAPHY
κρυπτόσ (kryptós)
“hidden”
+
γράφω (grápho)
“write”
=
Hidden Writing
HISTORY
4000 years ago, they used the concept of
SUBSTITUTION CIPHER with key for securing the
data.
 Since 1970: PUBLIC KEY CRYPTOGRAPHY, exchange
of secret messages with a person who you never met
before
 Now the present generation is using QUANTUM
CRYPTOGRAPHY for securing the information
without encrypting.
So, what is quantum cryptography??
QUANTUM CRYPTOGRAPHY
 Although the field of cryptography is ancient, but it is
not static. Quantum cryptography is a relatively new
concept in cryptography.
 Basically quantum cryptography is combination of
OTP and QKD.
 Quantum cryptography is based on two important
principles –
 Polarization of light.
 Heisenberg’s uncertainty principle
RSA
 The most widely used PKC is the RSA (Rivest –
shamir-Adleman) algorithm based on the
difficulty of factoring a product of two large
primes.
 Easy Problem Hard Problem
qpn  Given n
compute p and q.
QUANTUM KEY DISTRIBUTION
Quantum key distribution (QKD) uses quantum
mechanics to guarantee secure communication.
Quantum Key Distribution tell us all attempts of
eavesdropping.
Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
It enables two parties to produce a shared random bit
string known only to them, which can be used as a
key for encryption and decryption
OTP (ONE TIME PAD)
 One-time pad (OTP) is an encryption technique that
cannot be cracked if used correctly.
 The key used in a one-time pad is called a secret key
ADVANTAGES
 Virtually un-hackable.
 Simple to use.
 Less resources needed to maintain it.
 Used to detect eavesdropping in quantum key
distribution.
DISADVANTAGES
 Setup is expensive.
 Signal is limited upto approx. 90km.
FUTURE SCOPE
 The experiments suggests transmission to satellites is
possible, due to the lower atmospheric density at higher
altitudes.
 The current commercial systems are aimed mainly at
governments and corporations with high security
requirements.
 Factors preventing wide adoption of quantum
cryptography outside high security areas include the cost of
equipment, and the lack of a demonstrated threat to
existing key exchange protocols
CONCLUSION
• Quantum cryptography is a major achievement in
security engineering.
• As it gets implemented, it will allow perfectly secure
bank transactions, secret discussions for
government officials, and well-guarded trade secrets
for industry!
THANK YOU

More Related Content

What's hot

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
Shahrikh Khan
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
Ruwan Ranganath
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
NARESHGOTMAL
 

What's hot (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 

Viewers also liked

Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
Mrinal Mondal
 
Quantum computing meghaditya
Quantum computing meghadityaQuantum computing meghaditya
Quantum computing meghaditya
Meghaditya Roy Chaudhury
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
Darwin Gosal
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Omar Shehab
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
spreedniels
 
Eye interface technology, Electrooculography – A Proposed Model
Eye interface technology, Electrooculography – A Proposed ModelEye interface technology, Electrooculography – A Proposed Model
Eye interface technology, Electrooculography – A Proposed Model
Sneha Joshi
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
Shahrikh Khan
 
Cryptography101
Cryptography101Cryptography101
Cryptography101NCC Group
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
Seminar Links
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
VernBrownell
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
sitinursyafiqah
 
Part III - Quantum Mechanics
Part III - Quantum MechanicsPart III - Quantum Mechanics
Part III - Quantum Mechanics
Maurice R. TREMBLAY
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
Seminar Links
 

Viewers also liked (17)

Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
 
Quantum computing meghaditya
Quantum computing meghadityaQuantum computing meghaditya
Quantum computing meghaditya
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
abledit Solutions
abledit Solutionsabledit Solutions
abledit Solutions
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
 
Eye interface technology, Electrooculography – A Proposed Model
Eye interface technology, Electrooculography – A Proposed ModelEye interface technology, Electrooculography – A Proposed Model
Eye interface technology, Electrooculography – A Proposed Model
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
 
Cryptography101
Cryptography101Cryptography101
Cryptography101
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Part III - Quantum Mechanics
Part III - Quantum MechanicsPart III - Quantum Mechanics
Part III - Quantum Mechanics
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 

Similar to quantum cryptography

namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
ssuser6602e0
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
ijcisjournal
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
IRJET Journal
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
IJLT EMAS
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
IJMTST Journal
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdf
EIHEducation
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdf
EIHEducation
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
ijtsrd
 

Similar to quantum cryptography (20)

namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number Sy...
 
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
SECURED knowledge TRANSMISSION By Using Minimal KEY EXCHANGE MECHANISM FOR WI...
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdf
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdf
 
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 

quantum cryptography

  • 1. VIGNAN’S INSTITUTE OF MANAGEMENT AND TECHNOLOGY FOR WOMEN KONDAPUR(V),GHATKESAR(M),RANGAREDDY(DIST.) DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
  • 2.
  • 3. INTRODUCTION What is Cryptography?  Cryptography is the art of devising codes and ciphers.  Crypto analysis is the art of breaking them.  Cryptology is the combination of the two i. e Cryptography and Crypto analysis
  • 4. INTRODUCTION What is Quantum Cryptography?  Quantum Cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information.  This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.
  • 5. INTRODUCTION What is Quantum Cryptography? Contd. The Heisenberg Uncertainty principle, and quantum entanglement can be exploited in as a system of secure communication often referred to as “Quantum Cryptography”.
  • 6. INTRODUCTION Quantum Entanglement: Quantum entanglement is a physical phenomenon that occurs when pairs or groups of particles are generated or interact in ways such that the quantum state of each particle cannot be described independently of the others, even when the particles are separated by a large distance— instead, a quantum state must be described for the system as a whole.
  • 8. HISTORY 4000 years ago, they used the concept of SUBSTITUTION CIPHER with key for securing the data.
  • 9.  Since 1970: PUBLIC KEY CRYPTOGRAPHY, exchange of secret messages with a person who you never met before
  • 10.  Now the present generation is using QUANTUM CRYPTOGRAPHY for securing the information without encrypting. So, what is quantum cryptography??
  • 11. QUANTUM CRYPTOGRAPHY  Although the field of cryptography is ancient, but it is not static. Quantum cryptography is a relatively new concept in cryptography.  Basically quantum cryptography is combination of OTP and QKD.  Quantum cryptography is based on two important principles –  Polarization of light.  Heisenberg’s uncertainty principle
  • 12. RSA  The most widely used PKC is the RSA (Rivest – shamir-Adleman) algorithm based on the difficulty of factoring a product of two large primes.  Easy Problem Hard Problem qpn  Given n compute p and q.
  • 13. QUANTUM KEY DISTRIBUTION Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. Quantum Key Distribution tell us all attempts of eavesdropping. Quantum key distribution is only used to produce and distribute a key, not to transmit any message data It enables two parties to produce a shared random bit string known only to them, which can be used as a key for encryption and decryption
  • 14. OTP (ONE TIME PAD)  One-time pad (OTP) is an encryption technique that cannot be cracked if used correctly.  The key used in a one-time pad is called a secret key
  • 15.
  • 16.
  • 17.
  • 18. ADVANTAGES  Virtually un-hackable.  Simple to use.  Less resources needed to maintain it.  Used to detect eavesdropping in quantum key distribution.
  • 19. DISADVANTAGES  Setup is expensive.  Signal is limited upto approx. 90km.
  • 20. FUTURE SCOPE  The experiments suggests transmission to satellites is possible, due to the lower atmospheric density at higher altitudes.  The current commercial systems are aimed mainly at governments and corporations with high security requirements.  Factors preventing wide adoption of quantum cryptography outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols
  • 21. CONCLUSION • Quantum cryptography is a major achievement in security engineering. • As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry!