SlideShare ist ein Scribd-Unternehmen logo
1 von 22
QUANTUM
CRYPTOGRAPHY

     D.DEEPIKA
     B.TECH IV YEAR
CRYPTOGRAPHY
     κρυπτόσ (kryptós)
         “hidden”
             +
      γράυω (grápho)
          “write”
             =
     Hidden Writing
INTRODUCTION
What is Cryptography?
   Cryptography is the art of devising codes and ciphers.
   Crypto analysis is the art of breaking them.
   Cryptology is the combination of the two i. e Cryptography and
    Crypto analysis
What is Quantum Cryptography?
    Quantum Cryptography is an effort to allow two users of a
    common communication channel to create a body of shared
    and secret information. This information, which generally takes
    the form of a random string of bits, can then be used as a
    conventional secret key for secure communication.
    The Heisenberg Uncertainty principle and quantum
    entanglement can be exploited in as system of secure
    communication often referred to as “quantum Cryptography”.
HISTORY OF QUANTUM
CRYPTOGRAPHY
   Stephen Wiesner wrote “Conjugate Coding” in the
    late sixties

   Charles H. Bennett and Gilles Brassard revived the
    field in 1982 by combining quantum process with
    public key cryptography
QUANTUM CRYPTOGRAPHY
 Key distribution
 Eavesdropping

 Detecting eavesdropping

 Noise

 Error correction

 Privacy Amplification

 Encryption
KEY DISTRIBUTION
 Alice and Bob first agree on two representations for ones
  and zeroes
 One for each basis used, {,}
  and {, }.
 This agreement can be done in public
 Define
  1=         0=
  1=         0=
KEY DISTRIBUTION
KEY DISTRIBUTION - BB84
1.   Alice sends a sequence of photons to Bob.
     Each photon in a state with polarization
     corresponding to 1 or 0, but with randomly chosen
     basis.
2.   Bob measures the state of the photons he
     receives, with each state measured with respect
     to randomly chosen basis.
3.   Alice and Bob communicates via an open
     channel. For each photon, they reveal which basis
     was used for encoding and decoding respectively.
     All photons which has been encoded and decoded
     with the same basis are kept, while all those
     where the basis don't agree are discarded
EAVESDROPPING
 Eve has to randomly select basis for her
  measurement
 Her basis will be wrong in 50% of the time.
 Whatever basis Eve chose she will measure 1 or 0
 When Eve picks the wrong basis, there is 50%
  chance that she'll measure the right value of the bit
             E.g. Alice sends a photon with state
  corresponding to 1 in the {,} basis. Eve picks the
  {, } basis for her measurement which this time
  happens to give a 1 as result, which is correct.
Alice’s   Alice’s   Alice’s   Eve’s    Correct    Eve’s   Eve’s   Correct
basis       bit     photon    basis              photon    bit
                              {,}     Yes               1       Yes
            1                {, }     No               1       Yes
                                                          0        No
{,}                         {,}     Yes               0       Yes
            0                {, }     No               1        No
                                                          0       Yes
                              {,}      No               1       Yes
            1                                            0        No
                              {, }    Yes               1       Yes
{, }                        {,}      No               1        No
            0                                            0       Yes
                              {, }    yes               0       Yes
EVES PROBLEM
 Eve has to re-send all the photons to Bob
 Will introduce an error, since Eve don't know the
  correct basis used by Alice
 Bob will detect an increased error rate
 Still possible for Eve to eavesdrop just a few
  photons, and hope that this will not increase the
  error to an alarming rate. If so, Eve would have at
  least partial knowledge of the key.
DETECTING EAVESDROPPING
 When Alice and Bob need to test for eavesdropping
 By randomly selecting a number of bits from the
  key and compute its error rate
 Error rate < Emax   assume no eavesdropping
 Error rate > Emax   assume eavesdropping
  (or the channel is unexpectedly noisy)
  Alice and Bob should then discard the whole key
  and start over
NOISE
 Noise might introduce errors
 A detector might detect a photon even though there
  are no photons
 Solution:

    send the photons according to a time schedule.
    Then Bob knows when to expect a photon, and
      can discard those that doesn't fit into the
      scheme's time window.
 There also has to be some kind of error correction
  in the over all process.
ERROR CORRECTION
 Alice and Bob agree on a random permutation of
  the bits in the key
 They split the key into blocks of length k
 Compare the parity of each block. If they compute
  the same parity, the block is considered correct. If
  their parity is different, they look for the erroneous
  bit, using a binary search in the block. Alice and
  Bob discard the last bit of each block whose parity
  has been announced
 This is repeated with different permutations and
  block size, until Alice and Bob fail to find any
  disagreement in many subsequent comparisons
PRIVACY AMPLIFICATION
   Eve might have partial knowledge of the key.

   Transform the key into a shorter but secure key

   Suppose there are n bits in the key and Eve has
    knowledge of m bits.

   Randomly chose a hash function where
    h(x): {0,1}n  {0,1} n-m-s

   Reduces Eve's knowledge of the key to 2 –s / ln2 bits
ENCRYPTION
 Key of same size as the plaintext
 Used as a one-time-pad

 Ensures the crypto text to be absolutely
  unbreakable
ADVANTAGES:
   The biggest advantage of public key
    cryptography is the secure nature of the
    private key. In fact, it never needs to be
     transmitted or revealed to anyone.
   It enables the use of digital certificates and
    digital timestamps, which is a very secure
    technique of signature authorization.
DISADVANTAGES:
 Transmission time for documents encrypted using
  public key cryptography are significantly slower then
  symmetric cryptography. In fact, transmission of very
  large documents is prohibitive.
 The key sizes must be significantly larger than

  symmetric cryptography to achieve the same level of
  protection.
 Public key cryptography is susceptible to

   impersonation attacks.
CONCLUSION
 Quantum cryptography is a major achievement in
  security engineering.
 As it gets implemented, it will allow perfectly secure
  bank transactions, secret discussions for
  government officials, and well-guarded trade
  secrets for industry!
QUERIES
THANK U

Weitere ähnliche Inhalte

Was ist angesagt?

Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Kirby Linvill
 

Was ist angesagt? (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Quantam cryptogrphy ppt (1)

  • 1. QUANTUM CRYPTOGRAPHY D.DEEPIKA B.TECH IV YEAR
  • 2. CRYPTOGRAPHY κρυπτόσ (kryptós) “hidden” + γράυω (grápho) “write” = Hidden Writing
  • 3. INTRODUCTION What is Cryptography?  Cryptography is the art of devising codes and ciphers.  Crypto analysis is the art of breaking them.  Cryptology is the combination of the two i. e Cryptography and Crypto analysis What is Quantum Cryptography?  Quantum Cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.  The Heisenberg Uncertainty principle and quantum entanglement can be exploited in as system of secure communication often referred to as “quantum Cryptography”.
  • 4.
  • 5. HISTORY OF QUANTUM CRYPTOGRAPHY  Stephen Wiesner wrote “Conjugate Coding” in the late sixties  Charles H. Bennett and Gilles Brassard revived the field in 1982 by combining quantum process with public key cryptography
  • 6. QUANTUM CRYPTOGRAPHY  Key distribution  Eavesdropping  Detecting eavesdropping  Noise  Error correction  Privacy Amplification  Encryption
  • 7. KEY DISTRIBUTION  Alice and Bob first agree on two representations for ones and zeroes  One for each basis used, {,} and {, }.  This agreement can be done in public  Define 1= 0= 1= 0=
  • 9. KEY DISTRIBUTION - BB84 1. Alice sends a sequence of photons to Bob. Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis. 2. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis. 3. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded
  • 10. EAVESDROPPING  Eve has to randomly select basis for her measurement  Her basis will be wrong in 50% of the time.  Whatever basis Eve chose she will measure 1 or 0  When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the {,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.
  • 11. Alice’s Alice’s Alice’s Eve’s Correct Eve’s Eve’s Correct basis bit photon basis photon bit {,} Yes  1 Yes 1  {, } No  1 Yes  0 No {,} {,} Yes  0 Yes 0  {, } No  1 No  0 Yes {,} No  1 Yes 1   0 No {, } Yes  1 Yes {, } {,} No  1 No 0   0 Yes {, } yes  0 Yes
  • 12. EVES PROBLEM  Eve has to re-send all the photons to Bob  Will introduce an error, since Eve don't know the correct basis used by Alice  Bob will detect an increased error rate  Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.
  • 13. DETECTING EAVESDROPPING  When Alice and Bob need to test for eavesdropping  By randomly selecting a number of bits from the key and compute its error rate  Error rate < Emax assume no eavesdropping  Error rate > Emax assume eavesdropping (or the channel is unexpectedly noisy) Alice and Bob should then discard the whole key and start over
  • 14. NOISE  Noise might introduce errors  A detector might detect a photon even though there are no photons  Solution:  send the photons according to a time schedule.  Then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window.  There also has to be some kind of error correction in the over all process.
  • 15. ERROR CORRECTION  Alice and Bob agree on a random permutation of the bits in the key  They split the key into blocks of length k  Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced  This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons
  • 16. PRIVACY AMPLIFICATION  Eve might have partial knowledge of the key.  Transform the key into a shorter but secure key  Suppose there are n bits in the key and Eve has knowledge of m bits.  Randomly chose a hash function where h(x): {0,1}n  {0,1} n-m-s  Reduces Eve's knowledge of the key to 2 –s / ln2 bits
  • 17. ENCRYPTION  Key of same size as the plaintext  Used as a one-time-pad  Ensures the crypto text to be absolutely unbreakable
  • 18. ADVANTAGES:  The biggest advantage of public key cryptography is the secure nature of the private key. In fact, it never needs to be transmitted or revealed to anyone.  It enables the use of digital certificates and digital timestamps, which is a very secure technique of signature authorization.
  • 19. DISADVANTAGES:  Transmission time for documents encrypted using public key cryptography are significantly slower then symmetric cryptography. In fact, transmission of very large documents is prohibitive.  The key sizes must be significantly larger than symmetric cryptography to achieve the same level of protection.  Public key cryptography is susceptible to impersonation attacks.
  • 20. CONCLUSION  Quantum cryptography is a major achievement in security engineering.  As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry!

Hinweis der Redaktion

  1. A schedule design for optional periods of time/objectives.