SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Advances In
Cryptography
Basic Ideas in Cryptography

• Cryptography is the study of sending and receiving secret messages through the help of
cryptosystem.
• The basic idea is to modify a message so as to make it unintelligible to anyone but the intended
recipient

Brought To You By www.rareinput.com
• It’s the transmitting information with access restricted to the intended recipient even if the message is
intercepted by others.
• A typical application of cryptography in network security is to enable two parties to communicate
confidentially over a non-physically secured communication platform such as radio waves, the internet, etc.
• “A little knowledge is a dangerous thing” Very true in cryptography

• Cryptography is of increasing importance in our technological age
Broadcast
Network communications
Internet
E-mail
Cell phones

Brought To You By www.rareinput.com
Advancements in cryptography
[Today’s Talk]
 Quantum Cryptography
 Elliptic Curve Cryptography

Brought To You By www.rareinput.com
I.

Quantum Cryptography

• Quantum cryptography is the single most successful application of Quantum
Computing/Information Theory.
• For the first time in history, we can use the forces of nature to implement perfectly secure
cryptosystems.
• Quantum cryptography describes the use of quantum mechanical effects to perform
cryptographic tasks or to break cryptographic systems.
• The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also
often considered as quantum cryptography.
• Classical Cryptography relies heavily on the complexity of factoring integers.

Brought To You By www.rareinput.com
 Ideas from the Quantum World
• Light waves are propagated as discrete quanta called photons.
• They are massless and have energy momentum and angular momentum called spin.
• Spin carries the polarization.
• If on its way we put a polarization filter a photon may pass through it or may not.
• We can use a detector to check of a photon has passed through a filter.

Brought To You By www.rareinput.com
 Quantum key distribution
• The main key distribution of quantum cryptography is to solve the key distribution system
problem.
• Alice communicates with Bob via a quantum channel sending him photons.
• Then they discuss results using a public channel.
• After getting an encryption key Bob can encrypt his messages and send them by any public
channel.
• Both Alice and Bob have two polarizers each.
• One with the 0-90 degree basis (+) and one with 45-135 degree basis ( )
• Alice uses his polarizers to send randomly photons to Bob in one of the four possible
polarizations 0,45,90,135 degree.

Brought To You By www.rareinput.com
•

•

Bob uses his polarizers to measure each polarization of photons he receives.
He can use the( + )basis or the ( ) but not both simultaneously

Brought To You By www.rareinput.com
 presence of eavesdropping
• If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon.
• If he uses the misaligned filter he will receive no information about the photon .
• Also he will influence the original photon and be unable to retransmit it with the original
polarization.
• Bob will be able to deduce Ave’s presence.

Brought To You By www.rareinput.com
II. Elliptic Curve Cryptography
• Elliptic curve cryptography (ECC) is an approach to public-key
cryptography based on the algebraic structure of elliptic curves over finite
fields.
• ECC was proposed independently by cryptographers Victor Miller (IBM)
and Neal Koblitz (University of Washington) in 1985.
• It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm
Problem (ECDLP)
Like the prime factorization problem.
• ECDLP is another "hard" problem that is simple to state: Given two points,
P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ.
• Elliptic curves combine number theory and algebraic geometry.

Brought To You By www.rareinput.com
Cont..
• An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation:

•

The set of all of the solutions to the equation forms the elliptic curve.
• Elliptic curves have the interesting property that adding two points on the
elliptic curve yields a third point on the curve.
• The point Q is calculated as a multiple of the starting point P
Q = nP
An attacker might know P and Q but finding the integer, n, is a difficult problem to
solve. Q is the
public key, then, and n is the private key.

Brought To You By www.rareinput.com
Advantages & Disadvantages
• Advantages
• fast and compact implementation in hardware
• Shorter keys than RSA
• Disadvantages
• Complex mathematical description
• Short period of research in cryptanalysis (breaking cipher)

Brought To You By www.rareinput.com
 References
• http://en.wikipedia.org/wiki/Quantum_cryptography
• www.google.com
• http://www.springerreference.com/docs/html/chapterdbid/71039.html

Brought To You By www.rareinput.com
Thank
You
Shailesh Tyagi
Developer
www.rareinput.com

Weitere ähnliche Inhalte

Andere mochten auch

High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
Agate Studio
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 

Andere mochten auch (20)

Week13
Week13Week13
Week13
 
How circuit switches
How circuit switchesHow circuit switches
How circuit switches
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
Crytography
CrytographyCrytography
Crytography
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Crytography
CrytographyCrytography
Crytography
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Aes
AesAes
Aes
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Ähnlich wie Advances In Cryptography

Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 

Ähnlich wie Advances In Cryptography (20)

Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Advances In Cryptography

  • 2. Basic Ideas in Cryptography • Cryptography is the study of sending and receiving secret messages through the help of cryptosystem. • The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient Brought To You By www.rareinput.com
  • 3. • It’s the transmitting information with access restricted to the intended recipient even if the message is intercepted by others. • A typical application of cryptography in network security is to enable two parties to communicate confidentially over a non-physically secured communication platform such as radio waves, the internet, etc. • “A little knowledge is a dangerous thing” Very true in cryptography • Cryptography is of increasing importance in our technological age Broadcast Network communications Internet E-mail Cell phones Brought To You By www.rareinput.com
  • 4. Advancements in cryptography [Today’s Talk]  Quantum Cryptography  Elliptic Curve Cryptography Brought To You By www.rareinput.com
  • 5. I. Quantum Cryptography • Quantum cryptography is the single most successful application of Quantum Computing/Information Theory. • For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. • Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks or to break cryptographic systems. • The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also often considered as quantum cryptography. • Classical Cryptography relies heavily on the complexity of factoring integers. Brought To You By www.rareinput.com
  • 6.  Ideas from the Quantum World • Light waves are propagated as discrete quanta called photons. • They are massless and have energy momentum and angular momentum called spin. • Spin carries the polarization. • If on its way we put a polarization filter a photon may pass through it or may not. • We can use a detector to check of a photon has passed through a filter. Brought To You By www.rareinput.com
  • 7.  Quantum key distribution • The main key distribution of quantum cryptography is to solve the key distribution system problem. • Alice communicates with Bob via a quantum channel sending him photons. • Then they discuss results using a public channel. • After getting an encryption key Bob can encrypt his messages and send them by any public channel. • Both Alice and Bob have two polarizers each. • One with the 0-90 degree basis (+) and one with 45-135 degree basis ( ) • Alice uses his polarizers to send randomly photons to Bob in one of the four possible polarizations 0,45,90,135 degree. Brought To You By www.rareinput.com
  • 8. • • Bob uses his polarizers to measure each polarization of photons he receives. He can use the( + )basis or the ( ) but not both simultaneously Brought To You By www.rareinput.com
  • 9.  presence of eavesdropping • If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon. • If he uses the misaligned filter he will receive no information about the photon . • Also he will influence the original photon and be unable to retransmit it with the original polarization. • Bob will be able to deduce Ave’s presence. Brought To You By www.rareinput.com
  • 10. II. Elliptic Curve Cryptography • Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. • ECC was proposed independently by cryptographers Victor Miller (IBM) and Neal Koblitz (University of Washington) in 1985. • It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) Like the prime factorization problem. • ECDLP is another "hard" problem that is simple to state: Given two points, P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ. • Elliptic curves combine number theory and algebraic geometry. Brought To You By www.rareinput.com
  • 11. Cont.. • An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation: • The set of all of the solutions to the equation forms the elliptic curve. • Elliptic curves have the interesting property that adding two points on the elliptic curve yields a third point on the curve. • The point Q is calculated as a multiple of the starting point P Q = nP An attacker might know P and Q but finding the integer, n, is a difficult problem to solve. Q is the public key, then, and n is the private key. Brought To You By www.rareinput.com
  • 12. Advantages & Disadvantages • Advantages • fast and compact implementation in hardware • Shorter keys than RSA • Disadvantages • Complex mathematical description • Short period of research in cryptanalysis (breaking cipher) Brought To You By www.rareinput.com
  • 13.  References • http://en.wikipedia.org/wiki/Quantum_cryptography • www.google.com • http://www.springerreference.com/docs/html/chapterdbid/71039.html Brought To You By www.rareinput.com

Hinweis der Redaktion

  1. Changing a and b changes the shape of the curve, and small changes in these parameters can result in major changes in the set of (x,y) solutions.