SlideShare a Scribd company logo
Quantum
cryptography
:Public key distribution and coin tossing
Research :
Charles H. Bennett & Gilles Brassard
Present by : Ruwan Ranganath Senarathne
Outline Quantum Cryptography
Essential properties of polarized photons
Quantum public key distribution
Quantum coin tossing
BB84 Protocol
Q & A
Ultimate Goal
Cryptography
• The Art of Writing or Solving Codes.
• Classical Cryptography > Modern Cryptography > Number Theory based Public Key
Cryptography
• One Time Pad
• Key Generation and Key Distribution
Background
● Conventional cryptosystems such as ENIGMA, DES, RSA
● Digital communications in principle can always be passively monitored or copied
● Unless the key,used once only and long as clear text
● Computational complexity is not well enough understood
● Quantum Computers can use Shor’ Algorithm to break
Quantum cryptography uses photons to transmit a key.
Quantum cryptology depends on physics, not mathematics.
Heisenberg's Uncertainty Principle & Photon Polarization
Quantum key distribution protocols
Quantum Cryptography
QC = QKD + OTP
Background
● Conventional Computing - Bits
● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ
● Qubit could be a Photon, Electron, Nucleus..
● In a Quantum State particle can achieve a “Superposition”
● Quantum Computers can overcome todays computational limitations
Essential properties of polarized photons
• Photons - Photons are the fundamental particle of light.
– wave function : An individual photon can be described as having right or left circular
polarization, or a superposition of the two.
• The foundation of quantum physics is the unpredictability factor.
– Heisenberg's Uncertainty Principle :
• Photon polarization
– polarization filters, photon to take one state or another -- or polarize it.
• Rectilinear basis (0 and 90 degrees)
• Diagonal basis (45 and 135 degrees)
• Heisenberg uncertainty principle :
- states that certain pairs of physical properties are related in such a way that measuring one
property prevents the observer from simultaneously knowing the value for other.
• Principle of photon polarization:
- tells that an eavesdropper cannot copy unknown Qubits
Explanation
Source :: http://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/#hup
QKD Protocols
• A protocol is a set of rules governing the exchange of messages over a channel.
• A security protocol is a special protocol designed to ensure security properties are met during
communications.
• There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
Eve
• Unique property gain knowledge about eve trying get the key
• By using quantum superposition/entanglement and transmitting information in quantum states , a
communication system can be implemented which can detect eavesdropping.
• If the level of eavesdropping is below threshold , a key is produced guarantying the secure
communication otherwise no secure key is possible and communication is aborted
BB84 Communication Protocol
● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard
in 1984.
● It is the first quantum cryptography protocol
● Use Photon polarization
● four different non-orthogonal quantum states via a quantum channel to transmit the qubits
● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell
can be used too.
● The polarization basis is the mapping we decide to use for a particular state
● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the
horizontal and -45 o polarisations to encode the 1"
● Bob then randomly uses either a polarizer for diagonal polarisations or one in the
horizontal/vertical basis and records his choice and the polarization he measures
● Bob tells Alice on the public channel the sequence of analyzers he used during the
transmission, but not his results
● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons
she sent
● these compatible bits are used for the shared key
BB84 with eavesdropping
• If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s
measurements.
• In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect
measurement: Eve’s measurements are bound to affect the states of the photons.
• As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new
photons to Bob.`
• The photon states cannot be cloned (non-clone ability).
• Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
Quantum coin tossing
➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983
➔ Two unknown party communicate without third party
Quantum coin tossing ( cont>._)
Coin Tossing (Cont>._)
● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) .
● Use the polarization and send to Bob
● Bob use polarizer for each bit
● Two tables Rectilinear and diagonal photon table
● Polarizer can loss some photons
● Bob Make his guess
● Alice says if bob wins and tell her basis and
● Send entire bit sequece over classical channel
● Bob verify no cheating by providing his tables
Current Arguments
QKD is not Public key Cryptography
Eve can sabotage quantum channel to force Alice and Bob use classical channel
Expensive for longer keys
Thank you.
Quantum Cryptography - Quantum Coin Tossing

More Related Content

What's hot

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
Kirby Linvill
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sreekanth Narendran
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
Shahzad Ahmad
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
Kirby Linvill
 
quantum cryptography
quantum cryptographyquantum cryptography
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
Fatemeh Ghezelbash
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 

What's hot (20)

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 

Similar to Quantum Cryptography - Quantum Coin Tossing

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
gayatri thakur
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
Information Security Awareness Group
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Basundhara Deb Basundhara
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
B03250609
B03250609B03250609
B03250609
theijes
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Vishnu Pendyala
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
Maria Stylianou
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
drboon
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
IJNSA Journal
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
IJNSA Journal
 

Similar to Quantum Cryptography - Quantum Coin Tossing (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
B03250609
B03250609B03250609
B03250609
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 

More from Ruwan Ranganath

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brand
Ruwan Ranganath
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
Ruwan Ranganath
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
Ruwan Ranganath
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa intro
Ruwan Ranganath
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile Applications
Ruwan Ranganath
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016
Ruwan Ranganath
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communities
Ruwan Ranganath
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system
Ruwan Ranganath
 
Benefits of using foss
Benefits of using fossBenefits of using foss
Benefits of using foss
Ruwan Ranganath
 
Sl2 college web team
Sl2 college web teamSl2 college web team
Sl2 college web team
Ruwan Ranganath
 

More from Ruwan Ranganath (10)

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brand
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa intro
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile Applications
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communities
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system
 
Benefits of using foss
Benefits of using fossBenefits of using foss
Benefits of using foss
 
Sl2 college web team
Sl2 college web teamSl2 college web team
Sl2 college web team
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Quantum Cryptography - Quantum Coin Tossing

  • 1. Quantum cryptography :Public key distribution and coin tossing Research : Charles H. Bennett & Gilles Brassard Present by : Ruwan Ranganath Senarathne
  • 2. Outline Quantum Cryptography Essential properties of polarized photons Quantum public key distribution Quantum coin tossing BB84 Protocol Q & A
  • 4. Cryptography • The Art of Writing or Solving Codes. • Classical Cryptography > Modern Cryptography > Number Theory based Public Key Cryptography • One Time Pad • Key Generation and Key Distribution
  • 5. Background ● Conventional cryptosystems such as ENIGMA, DES, RSA ● Digital communications in principle can always be passively monitored or copied ● Unless the key,used once only and long as clear text ● Computational complexity is not well enough understood ● Quantum Computers can use Shor’ Algorithm to break
  • 6. Quantum cryptography uses photons to transmit a key. Quantum cryptology depends on physics, not mathematics. Heisenberg's Uncertainty Principle & Photon Polarization Quantum key distribution protocols Quantum Cryptography QC = QKD + OTP
  • 7. Background ● Conventional Computing - Bits ● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ ● Qubit could be a Photon, Electron, Nucleus.. ● In a Quantum State particle can achieve a “Superposition” ● Quantum Computers can overcome todays computational limitations
  • 8. Essential properties of polarized photons • Photons - Photons are the fundamental particle of light. – wave function : An individual photon can be described as having right or left circular polarization, or a superposition of the two. • The foundation of quantum physics is the unpredictability factor. – Heisenberg's Uncertainty Principle : • Photon polarization – polarization filters, photon to take one state or another -- or polarize it. • Rectilinear basis (0 and 90 degrees) • Diagonal basis (45 and 135 degrees)
  • 9. • Heisenberg uncertainty principle : - states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value for other. • Principle of photon polarization: - tells that an eavesdropper cannot copy unknown Qubits Explanation
  • 11. QKD Protocols • A protocol is a set of rules governing the exchange of messages over a channel. • A security protocol is a special protocol designed to ensure security properties are met during communications. • There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
  • 12. Eve • Unique property gain knowledge about eve trying get the key • By using quantum superposition/entanglement and transmitting information in quantum states , a communication system can be implemented which can detect eavesdropping. • If the level of eavesdropping is below threshold , a key is produced guarantying the secure communication otherwise no secure key is possible and communication is aborted
  • 13. BB84 Communication Protocol ● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. ● It is the first quantum cryptography protocol ● Use Photon polarization ● four different non-orthogonal quantum states via a quantum channel to transmit the qubits ● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell can be used too. ● The polarization basis is the mapping we decide to use for a particular state
  • 14.
  • 15.
  • 16. ● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the horizontal and -45 o polarisations to encode the 1" ● Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures ● Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results ● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent ● these compatible bits are used for the shared key
  • 17. BB84 with eavesdropping • If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements. • In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons. • As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob.` • The photon states cannot be cloned (non-clone ability). • Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
  • 18. Quantum coin tossing ➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983 ➔ Two unknown party communicate without third party
  • 19. Quantum coin tossing ( cont>._)
  • 20. Coin Tossing (Cont>._) ● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) . ● Use the polarization and send to Bob ● Bob use polarizer for each bit ● Two tables Rectilinear and diagonal photon table ● Polarizer can loss some photons ● Bob Make his guess ● Alice says if bob wins and tell her basis and ● Send entire bit sequece over classical channel ● Bob verify no cheating by providing his tables
  • 21. Current Arguments QKD is not Public key Cryptography Eve can sabotage quantum channel to force Alice and Bob use classical channel Expensive for longer keys

Editor's Notes

  1. “the coding and decoding of secret messages.” The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them Cryptography – Art of creating and using Cryptosystems Cryptanalysis – Art of breaking Cryptosystems Cryptology – study of Cryptography and Cryptosystems
  2. based on a mixture of guesswork and mathematics relies heavily on the complexity of factoring integers To prove the computation security of public key cryptosystem
  3. Via quantum channel to transmit the bits of Alice's random key
  4. In a Quantum State particle can achieve a “Superposition” – Its Exist in multiple ways simultaneously
  5. It's impossible to know both an object's position and velocity -- at the same time. Through the use of polarization filters, we can force the photon to take one state or another -- or polarize it.
  6. due to non-cloning algorithm.
  7. • We will only discuss BB84 here.
  8. • Unique property of quantum cryptography is the ability of two communicating users to detect the presence of third party trying to gain knowledge of the key.
  9. Let us suppose she uses the vertical and the +45 o polarisations for encoding the \0" and the horizontal and -45 o polarisations to encode the \1" bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures (Fig. 1 and Table I). The probability of using the wrong analyzer and therefore obtaining a random result is 50%
  10. horizontal and -45 o polarisations to encode the \1" Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent these compatible bits are used for the shared key
  11. come to agree on a winner and a loser in such a way that each party has exactly 50 percent chance of winning
  12. Alice choose random basis ( Rectilinear ) and sequence of random bits ( 1000 should be enough ) . Use the polarization and send to Bob Bob use polarizer for each bit Two tables Rectiliear and diagonal photon table Polarizer can loss some photons Bob Make his guess Alice says if bob wins and tell her basis and Send entire bit sequece over classical channel Bob verify no cheating by providing his tables Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put. Bob to cheat - Bob would need to guess Alice’s basis with probability greater than 1 / 2.
  13. Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put.