SlideShare ist ein Scribd-Unternehmen logo
1 von 17
SWITCH FROM TRADITIONAL TO MODERN
CRYPTOGRAPHY

BY:
PRASOON SRIVASTAVA
HIMANSHU SHEKHAR
FOUNDATION
• A message is Plaintext
• The process of disguising a message in such a way as to hide its substance is
Encryption.
• An encrypted message is Cipher text
• The process of turning cipher text back into plaintext is Decryption.
CATEGERIZATION OF CIPHER
1. Symmetric Key Algorithm
2.Asymmetric key algorithm
ECB Mode of encryption

The basic block diagram ECB encryption technique
OFB Mode of encryption

The basic block diagram OFB encryption technique
TRADITIONAL CRYPTOGRAPHY
• The problem with public-key cryptology is that it's based on the
staggering size of the numbers created by the combination of the key
and the algorithm used to encode the message.
• The problem with Private key algorithm is that there's almost always a
place for an unwanted third party to listen in and gain information the
users don't want that person to have.
ONE OF THE GREAT CHALLENGES
OF CRYPTOLOGY
To Keep Unwanted Parties Or Eavesdroppers From Learning Of
Sensitive Information.
And the solution is “QUANTUM CRYPTOLOGY”
QUANTUM CRYPTOLOGY
Quantum physics is a branch of science that deals with
discrete, indivisible units of energy called quanta as described by the
Quantum Theory. There are five main ideas represented in Quantum
Theory:
1. Energy is not continuous, but comes in small but discrete units.
2. The elementary particles behave both like particles and like waves.
3. The movement of these particles is inherently random.
4. It is physically impossible to know both the position and the
momentum of a particle at the same time. The more precisely one is
known, the less precise the measurement of the other is.
5. The atomic world is nothing like the world we live in.
QUANTUM CRYPTOLOGY BASICS
1.Quantum cryptography uses photons to transmit a key
2. Each type of a photon's spin represents one piece of information -usually a 1 or a 0, for binary code
3.Polarize them through either the X or the + filters, so that each
polarized photon has one of four possible states: (|), (--), (/) or ( ).
QUANTUM CRYPTOLOGY
WORKING
1. Alice sends Bob her photons using an LED, so that each polarized photon has one of
four possible states: (|), (--), (/) or ( ).
2. As Bob receives these photons, he decides whether to measure each with either his +
or X filter -- he can't use both filters together.
3. After the entire transmission, Bob and Alice have a non-encrypted discussion about the
transmission.
4. Bob: Plus Alice: Correct
5. Bob: Plus Alice: Incorrect
6. Bob: X Alice: Correct
7. A third party listening in on their conversation can't determine what the actual photon
sequence is.
REALIZATATION OF QUANTUM
CRYPTOLOGY USING MATLAB
1.Here we will realize our “X” and “+” filter using following table.
“+”table
“X” table
11

10

01

00

00

01

10

11

2. Filter selection:
a) By LFSR
b) Simple random sequence which will be retained by the sender.
Our message: “lovely professional university”
• Its symbol output: Transmitted Data “Few binary sequence”
Binary data
Sequence

01

10

11

00

01

10

11

11

01

11

Symbol
Transmitted

2

0

3

1

0

2

1

1

1

1

Limiter Used

+

+

X

X

X

X

+

+

X

+

• Received Data Sequence:
Received Sequence

2

0

3

1

0

2

1

1

1

1

Predicted Limiter

X

+

+

+

X

X

+

X

+

+

Received Symbol

10

10

00

11

01

10

11

00

10

11
Table representing the asking process:
Bob Replies for his
choice of filter

X

+

+

+

X

X

+

X

+

+

Response

W

R

W

W

R

R

R

W

W

R

• W- Wrong

R- Right

Hence, Bob Gets information about the choice of filter and corrects himself for the
wrong one (either discards it and ask for retransmission, or makes a guess).

Knowledge of changed sequence
If the choice of filter used is correct but the data matched for parity is found wrong,
then the receiver gets to know that the data sequence has been tampered. Hence, he
can stop the transmission further knowing that the communication channel is being
tapped.
COMPANIES IN THIS FIELD
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY

Weitere ähnliche Inhalte

Ähnlich wie SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY

Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 

Ähnlich wie SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY (20)

Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum
QuantumQuantum
Quantum
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 

Mehr von Himanshu Shekhar

Mehr von Himanshu Shekhar (6)

Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Static variable
Static variableStatic variable
Static variable
 
Modified bicmos
Modified bicmosModified bicmos
Modified bicmos
 
Sample Resume
Sample Resume Sample Resume
Sample Resume
 
Questionnaire on Mobile usage
Questionnaire on Mobile usageQuestionnaire on Mobile usage
Questionnaire on Mobile usage
 
time hopping spread spectrum term paper
time hopping spread spectrum term papertime hopping spread spectrum term paper
time hopping spread spectrum term paper
 

Kürzlich hochgeladen

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 

SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY

  • 1. SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY BY: PRASOON SRIVASTAVA HIMANSHU SHEKHAR
  • 2. FOUNDATION • A message is Plaintext • The process of disguising a message in such a way as to hide its substance is Encryption. • An encrypted message is Cipher text • The process of turning cipher text back into plaintext is Decryption.
  • 3. CATEGERIZATION OF CIPHER 1. Symmetric Key Algorithm
  • 5. ECB Mode of encryption The basic block diagram ECB encryption technique
  • 6. OFB Mode of encryption The basic block diagram OFB encryption technique
  • 7. TRADITIONAL CRYPTOGRAPHY • The problem with public-key cryptology is that it's based on the staggering size of the numbers created by the combination of the key and the algorithm used to encode the message. • The problem with Private key algorithm is that there's almost always a place for an unwanted third party to listen in and gain information the users don't want that person to have.
  • 8. ONE OF THE GREAT CHALLENGES OF CRYPTOLOGY To Keep Unwanted Parties Or Eavesdroppers From Learning Of Sensitive Information. And the solution is “QUANTUM CRYPTOLOGY”
  • 9. QUANTUM CRYPTOLOGY Quantum physics is a branch of science that deals with discrete, indivisible units of energy called quanta as described by the Quantum Theory. There are five main ideas represented in Quantum Theory: 1. Energy is not continuous, but comes in small but discrete units. 2. The elementary particles behave both like particles and like waves. 3. The movement of these particles is inherently random. 4. It is physically impossible to know both the position and the momentum of a particle at the same time. The more precisely one is known, the less precise the measurement of the other is. 5. The atomic world is nothing like the world we live in.
  • 10. QUANTUM CRYPTOLOGY BASICS 1.Quantum cryptography uses photons to transmit a key 2. Each type of a photon's spin represents one piece of information -usually a 1 or a 0, for binary code 3.Polarize them through either the X or the + filters, so that each polarized photon has one of four possible states: (|), (--), (/) or ( ).
  • 11.
  • 12. QUANTUM CRYPTOLOGY WORKING 1. Alice sends Bob her photons using an LED, so that each polarized photon has one of four possible states: (|), (--), (/) or ( ). 2. As Bob receives these photons, he decides whether to measure each with either his + or X filter -- he can't use both filters together. 3. After the entire transmission, Bob and Alice have a non-encrypted discussion about the transmission. 4. Bob: Plus Alice: Correct 5. Bob: Plus Alice: Incorrect 6. Bob: X Alice: Correct 7. A third party listening in on their conversation can't determine what the actual photon sequence is.
  • 13. REALIZATATION OF QUANTUM CRYPTOLOGY USING MATLAB 1.Here we will realize our “X” and “+” filter using following table. “+”table “X” table 11 10 01 00 00 01 10 11 2. Filter selection: a) By LFSR b) Simple random sequence which will be retained by the sender.
  • 14. Our message: “lovely professional university” • Its symbol output: Transmitted Data “Few binary sequence” Binary data Sequence 01 10 11 00 01 10 11 11 01 11 Symbol Transmitted 2 0 3 1 0 2 1 1 1 1 Limiter Used + + X X X X + + X + • Received Data Sequence: Received Sequence 2 0 3 1 0 2 1 1 1 1 Predicted Limiter X + + + X X + X + + Received Symbol 10 10 00 11 01 10 11 00 10 11
  • 15. Table representing the asking process: Bob Replies for his choice of filter X + + + X X + X + + Response W R W W R R R W W R • W- Wrong R- Right Hence, Bob Gets information about the choice of filter and corrects himself for the wrong one (either discards it and ask for retransmission, or makes a guess). Knowledge of changed sequence If the choice of filter used is correct but the data matched for parity is found wrong, then the receiver gets to know that the data sequence has been tampered. Hence, he can stop the transmission further knowing that the communication channel is being tapped.