SlideShare a Scribd company logo
1 of 26
Download to read offline
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Quantum Key Distribution In Quantum
Cryptography
Shahrukh Ayaz Khan
Seminar Presentation
SSBTā€™s College of Engineering & Technology,
Bambhori, Jalgaon - 425 001, Maharashtra, India
October 6, 2015
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 1/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Presentation Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 2/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 3/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
What is Cryptography?
Cryptography: the coding and decoding of secret
messages.
Cryptography is the art of rendering a message
unintelligible to any unauthorized party
dkssudgktpdy
(Korean)
It is part of the broader ļ¬eld of cryptology, which also
includes cryptoanalysis, the art of code breaking
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 4/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Need For Cryptography
Suppose Alice want to send a secret message to his friend
Bob over an insecure channel
we have to prevent Eve from Eavesdropping on
communication between Alice and Bob.
Figure: Meet Alice and Bob
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 5/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 6/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Cryptography
What is key?
Encryption is combine a message with some additional
information - known as the key and produce a
cryptogram.
Decryption is combine a cryptogram with some additional
information - known as the key and produce a message.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 7/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Types of Cryptosystems
Symmetric - use the same (secret) key to encrypt and
decrypt a message
Asymmetric - use one key (the public key) to encrypt a
message and a diļ¬€erent key (the private key) to decrypt it.
Asymmetric cryptosystems are also called public key
cryptosystems.
Figure: Process of cryprography
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 8/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
One-Time Pad
ļ¬rst proposed by Gilbert Vernam in 1926
This cryptosystem is thus provably secure in the sense of
information theory (Shannon 1949)
Actually, this is today the only provably secure
cryptosystem
Only problem is distributing the keys and it is Diļ¬ƒcult to
implement
Figure: One time pad
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 9/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 10/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Need of Quantum Cryptography?
The problem of distributing the keys in the OTP is
overcomed in Quantum Key Distribution
Using quantum eļ¬€ects, we can distribute keys in perfect
secrecy!
The Result is Perfect Cryptosystem, QC = QKD + OTP
Classical Cryptography relies heavily on the complexity of
factoring integers.
Quantum Computers can use Shors Algorithm to
eļ¬ƒciently break todays cryptosystems
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 11/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Quantum Elements
Quantum Mechanics depends on 2 major elements of quantum
mechanics: i.e heisenberg uncertainity principle and principle of
photon polarization.
Heisenberg uncertainty principle : states that certain pairs
of physical properties are related in such a way that
measuring one property prevents the observer from
simultaneously knowing the value for other.
Principle of photon polarization: tells that an
eavesdropper cannot copy unknown Qubits due to
non-cloning algorithm.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 12/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Overview of Quantum Cryptography
Unique property of quantum cryptography is the ability of
two communicating users to detect the presence of third
party trying to gain knowledge of the key.
By using quantum superposition/entanglement and
transmitting information in quantum states , a
communication system can be implemented which can
detect eavesdropping.
The polarization basis is the mapping we decide to use for
a particular state
Entangled pairs of photon are used that aļ¬€ects
randomness of measurements
Figure: Photon Polarization using BasesApril 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 13/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 14/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Quantum Key Distribution
Quantum Key Distribution exploits the eļ¬€ects discussed in
order to thwart eavesdropping.
It enables two parties to produce a shared random bit
string known only to them, which can be used as a key for
encryption and decryption.
If an eavesdropper uses the wrong polarization basis to
measure the channel, the result of the measurement will
be random.
There are three main security protocols for QKD: BB84,
B92, and Entanglement-Based QKD.
We will only discuss BB84 here.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 15/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
BB84
BB84 was the ļ¬rst security protocol implementing
Quantum Key Distribution.
The key consists of bits that will be transmitted as
photons.
Each bit is encoded with a random polarization basis!
Alice and Bob talk on the telephone:
Alice chooses a subset of the bits (the test bits) and
reveals which basis she used to encode them to Bob.
Bob tells Alice which basis he used to decode the same
bits.
Where the same basis was used, Alice tells Bob what bits
he ought to have got.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 16/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
BB84 with no Eavesdropping
The test bits allow Alice and Bob to test whether the channel
is secure.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 17/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Cont..
Figure: Getting the Final Key
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 18/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
BB84 with Eavesdropping
If an eavesdropper Eve tries to tap the channel, this will
automatically show up in Bobs measurements.
In those cases where Alice and Bob have used the same
basis, Bob is likely to obtain an incorrect measurement
As Eve intercepts Alices photons, she has to measure them
with a random basis and send new photons to Bob.
The photon states cannot be cloned (non-cloneability).
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 19/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 20/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Merits
Nearly Impossible to steal
Detect if someone is listening
Secure
Limitations
Price limits length,signal is absorbed, noise increased
Availability
Compete with traditional networks
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 21/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Future Scope
Future applications are in the most secure communication lines
for bank-to-ATM transactions, ļ¬nancial information protection
over the internet, and military and government communications
including the use for ship-to-ship, ground-to-satellite, and
satellite-to-satellite communication.
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 22/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Outline
1 Introduction
2 Classical Cryptography
3 Quantum Cryptography
4 Quantum Key Distribution
5 Pros and Cons
6 Conclusion
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 23/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Conclusion
Quantum cryptography is a major achievement in security
engineering.
As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government oļ¬ƒcials,
and well-guarded trade secrets for industry!
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 24/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
References
1 N. Namekata, S. Mori, and S. Inoue, Quantum key
distribution over an installed multimode optical ļ¬ber local
area network, Optical Express, 2015.
2 A. Beresford and F. Stajano, Location privacy in pervasive
computing, IEEE Pervasive Computing, 2011.
3 K. G. Paterson, F. Piper, and R. Schack, Why quantum
cryptography?, Quantum physics, quant-ph/0406147,
June 2004.
4 Hidema Tanaka, Security Analysis of Generalized
Conļ¬dential Modulation for Quantum Communication
International Journal of Computer Networks &
Communications (IJCNC) Vol.5, No.5, September 2013
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 25/26
Quantum Key
Distribution
Outline
Introduction
Classical
Cryptography
Quantum
Cryptography
Quantum Key
Distribution
Pros and Cons
Conclusion
Thank You...
ShahrukhA.Khan
April 10, 2015 Shahrukh Ayaz Khan Quantum Key Distributionl 26/26

More Related Content

What's hot

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
Ā 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
Ā 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
Ā 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptographyShivangi Saxena
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyNishant Bhardwaj
Ā 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
Ā 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
Ā 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
Ā 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
Ā 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
Ā 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computingt0pgun
Ā 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
Ā 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Professor Lili Saghafi
Ā 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
Ā 

What's hot (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
Ā 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
Ā 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Ā 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
Ā 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Ā 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Ā 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Ā 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ā 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Ā 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Ā 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Ā 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Ā 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
Ā 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Ā 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
Ā 

Viewers also liked

Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computersNancy Mann
Ā 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networksstellajoseph
Ā 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energysurat murthy
Ā 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
Ā 
Neural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) AlgorithmNeural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) AlgorithmMostafa G. M. Mostafa
Ā 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptographyspreedniels
Ā 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security ManagerShahrikh Khan
Ā 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsSean Carroll
Ā 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsSendash Pangambam
Ā 

Viewers also liked (12)

Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Ā 
Artificial neural networks
Artificial neural networksArtificial neural networks
Artificial neural networks
Ā 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
Ā 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energy
Ā 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Ā 
abledit Solutions
abledit Solutionsabledit Solutions
abledit Solutions
Ā 
Neural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) AlgorithmNeural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) Algorithm
Ā 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
Ā 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
Ā 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum Mechanics
Ā 
Quantum Computing and D-Wave
Quantum Computing and D-WaveQuantum Computing and D-Wave
Quantum Computing and D-Wave
Ā 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
Ā 

Similar to Quantum Key Distribution

namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfssuser6602e0
Ā 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsVijay Karan
Ā 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsVijay Karan
Ā 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
Ā 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
Ā 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Ā 
B03250609
B03250609B03250609
B03250609theijes
Ā 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Ā 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyAndrew Manoske
Ā 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
Ā 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
Ā 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
Ā 
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...ijcisjournal
Ā 
2 basic of cryptography
2   basic of cryptography2   basic of cryptography
2 basic of cryptographyPanji Prasetyo
Ā 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to CryptographyMichael Soltys
Ā 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fearsMark Carney
Ā 

Similar to Quantum Key Distribution (20)

namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
Ā 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
Ā 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
Ā 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Ā 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Ā 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
Ā 
B03250609
B03250609B03250609
B03250609
Ā 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
Ā 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
Ā 
presentation
presentationpresentation
presentation
Ā 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
Ā 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
Ā 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
Ā 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
Ā 
slides_korkikian
slides_korkikianslides_korkikian
slides_korkikian
Ā 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Ā 
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Funct...
Ā 
2 basic of cryptography
2   basic of cryptography2   basic of cryptography
2 basic of cryptography
Ā 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
Ā 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fears
Ā 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
Ā 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
Ā 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Ā 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Ā 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
Ā 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Ā 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Ā 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
Ā 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Ā 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Ā 
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Serviceyoung call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
Ā 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Ā 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Ā 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Ā 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Ā 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Ā 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
Ā 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Ā 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
Ā 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Ā 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Ā 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Ā 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Ā 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Ā 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Ā 

Quantum Key Distribution