SlideShare a Scribd company logo
1 of 28
Presented by:
Shahzad Ahmad
M.tech-2nd Year(CIS)
18LECM066
 What is Cryptography?
 History of Quantum Cryptography
 Quantum Cryptography
 Heisenberg Uncertainty principle
 Polarization of Photon
 Quantum Communication Block Diagram
 Quantum key Distribution Protocol
 Implementing Quantum Cryptography
 Advantages & Disadvantages
 Conclusion
 References
CONTENTS :
WHAT IS CRYPTOGRAPHY?
• Cryptography(derived from Greek word kryptós “hidden secret”
and graphein, "to write“) is the science of codes and ciphers.
Fig.1 Block Diagram Of Cryptography[1]
Fig. 2 -Block Diagram Of Cryptography[2]
OTP (ONE TIME PAD)
• One-time pad (OTP) is an encryption technique that cannot
be cracked if used correctly.
• The key used in a one-time pad is called a secret key.
• The problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
• One-time pads are “information theoretically secure".
Fig. 3-OTP Example
(William Stalling,Cryptography And Network Security,edition 4th)
• Quantum cryptography is an emerging technology in which
two parties can secure network communications by applying
the phenomenon of quantum physics.
• It uses photon and photon’s polarization which is their
quantized properties to encode the information .
• QKD is a promising technique that ensures unconditionally
secure distribution of a secret key, between two end points.
Quantum Cryptography :
• First proposed by Stephen Wiesner in 1969.
• Bennet and Brassard proposed the Quantum key distribution
Protocol in 1984.
• In 1991, Artur Ekert, developed a different approach to QKD
based on peculiar quantum correlations i.e. known as
quantum entanglement.
HISTORY OF QUANTUM CRYPTOGRAPHY :
• Quantum Cryptography is combination of OTP and QKD.
• QKD offers an information-theoretically secure solution to the
key exchange problem.
• Quantum cryptography is based on two important principles-
i. Heisenberg’s uncertainty principle
ii. Polarization of Photon
QUANTUM CRYPTOGRAPHY
• It could be used for cryptography was first devised by Stephen
Wiesner, a physicist in 1969.
• It state that the observer simultaneously cannot measure two
physical properties which are related with each other.
• With regards to this definition , two examples are referred-
i. For a particle P, two physical properties i.e. position and the
Momentum cannot be calculated simultaneously.
ii. The measurement of a photon cannot be done in rectilinear
basis and diagonal basis simultaneously.
HEISENBERG’S UNCERTANITY PRINCIPLE :
• The process of transforming unpolarized light into
polarized light is known as polarization.
Fig. 4- Polarization of Photon
(Resnick Halliday,Principles Of Physics,edition9th)
POLARIZATION OF PHOTON :
• The photon is polarized in one of the basis to represent a bit
known as a Qubit.
• In Polarization of Photons replica of qubits is not possible
according to the No Cloning Theorem.
• The use of Photons leads to the evolution of Quantum
Cryptography.
• Polarization of photon is done in rectilinear basis and diagonal
basis to represent binary bits .[4]
Polarizatio
n
Basis Binary
bit
0° Rectilinear 0
90° Rectilinear 1
45° Diagonal 0
135° Diagonal 1
Figure.5
Polarization of Photons To Represent Bits :
• A bit can be in the state 0 or 1 whereas a qubit can occur in the
state |0⟩ or |1⟩ .
• Superposition state is noted as: |ψ⟩=α|0⟩+β|1 ⟩
• The probability of obtaining |ψ⟩ in |0⟩ state is |α|2 and the
probability of obtaining |ψ⟩ in |1 ⟩ state is |β|2.
• The probability of getting result of a measurement is obtained by
squaring the coefficients.
The condition is |α|2 + |β|2 = 1
QUBITS AND QUANTUM STATES :
• The state can be written by stacking the two complex number
which is a two-dimensional complex unit vector.
CONTD….
𝛼
𝛽
|0⟩ =
1
0
where α=1, 𝛽=0 |1⟩ =
0
1
where α=0, 𝛽=1
Where, |ψ⟩ = cosθ |0⟩+ sinθ |1 ⟩=
𝑐𝑜𝑠θ
𝑠𝑖𝑛θ
Figure.6 [4]
• Notation 1 and 2 are state 0° and state 90° in rectilinear basis
respectively.
• Notation 3 and 4 are state 45°and state 135° in diagonal basis
respectively.
Notation Of Quantum State :
1
√2
( |0⟩ + |1⟩ ) = | / ⟩
1
√2
( |0⟩ - |1⟩ ) = |  ⟩
1. |0⟩ = |−⟩
2. |1⟩ = | ⃓ ⟩
3.
4.
PROBABILITY OF A PHOTON :
1. Probability of a photon transmitted and
produced in same basis and same state
2. Probability of a photon transmitted and
produced in same basis but different stat
3. Probability of a photon transmitted and
produced in different basis
4. Probability of a photon transmitted in
one basis and produced at an angle
Figure.7 [4] Figure.8 [4]
Figure.9 [4] Figure.10 [4]
• Message is send through the public channel while key is send
through quantum channel.
Figure.11 Quantum Communication [5]
QUANTUM COMMUNICATION:
QUANTUM KEY DISTRIBUTION PROTOCOLS:
• It is a secure communication method which implements a crypto-
graphic protocol involving components of quantum mechanics.
• QKD can detect any eavesdropping.
• QKD is only used to produce and distribute a key, not to transmit
any message data.
• QKD Protocols are various type-
i. BB84 Protocol
ii. B92 Protocol
iii. Six state Protocol
• BB84 was the first security protocol implementing Quantum Key
Distribution.
• This protocol depended on Heisenberg Uncertainty principle.
• It uses the idea of photon polarization.
• Communicating parties uses two communication channels –
i. classical channel and
ii. a quantum channel
• Qubits transmitted on the quantum channel and the conventional
messages transmitted on classical channel.
BB84 PROTOCOL :
Figure.12 BB84 Protocol[5]
CONTD….
• It is a modified protocol of BB84 with two states.
• A photon polarization of 0° in the rectilinear basis is used to
represent binary 0 and 45° in the diagonal basis is binary 1.
B92 PROTOCOL :
Figure.13 [5]
SIX-STATE PROTOCOL (SSP) :
• SSP uses six states on three orthogonal basis to encode the
bits which are required for communication between entities.
• The probability of using one of the basis equals 1/3.
Figure.14[5]
Implementing Quantum Cryptography :
• BBN, Harvard, and Boston University built the DARPA quantum
network , the world's first network that delivers end-to-end
network security via high-speed quantum key distribution.
• This network is suitable for deployment in metro-size areas via
standard telecom fiber.
• The DARPA security model is the cryptographic virtual private
network (VNP).
DISADVANTAGES ::
• While traveling through the channel (i.e. optical fiber or air)there is
possibility of change in polarization of photon due to various
causes.
• Need of dedicated channel is must between source and
destinations which implies high cost.
ADVANTAGES :
• Used to detect eavesdropping in QKD (Quantum Key Distribution).
• Virtually unhackable.
CONCLUSION:
:
• Quantum Cryptography has the potential to make a valuable
contribution to the network security among government,
businesses and academic sectors.
• Prominent technology wherein two entities can communicate
securely with the sights of quantum physics.
• QKD offers unconditionally secure communication based on
quantum mechanics .
• Integration of Quantum Cryptography in Wireless Networks
has great prospective in terms of better network security.
REFERENCES :
[1] Roger A. Grimes, “Cryptography Apocalypse: Preparing for the Day When
Quantum Computing Breaks Today’s Crypto”,Wiley-2020
[2] Jintai Ding ,Rainer Steinwandt, “Post-Quantum Cryptography”: 10th
International Conference, Springer, May 2019
[3] Mahdi H. Al Hasani,Kais A. Al Naimee, “Impact security enhancement in
chaotic quantum cryptography”,Elsevier, June 2019
[4] Laszlo Gyongyosi, Laszlo Bacsardi, “A Survey on Quantum Key
Distribution”:IEEE Infocommunication Journal Vol. XI,2019
[5] V. Padamvathi , B. Vishnu Vardhan , A.V.N. Krishna, " Quantum Cryptography
and Quantum Key Distribution Protocols: A Survey “,IEEE 6th International
Conference on Advance Computing , Feb 2016.
[6] C.H.Bennett, and G. Brassard, " Quantum Cryptography: Public key
distribution and coin tossing ",Theoretical Computer Science, Elseiver, vol.
560, 2014.
[7] R.Goel , M.Garuba , A.Girma, " Research Directions in Quantum
Cryptography", IEEE fourth International Conference on Information
Technology, April 2007.
[8] M.S. Sharbaf , " Quantum Cryptography: “A New Generation of Information
Technology Security System " ,IEEE Sixth International Conference on
Information Technology, April 2009.

More Related Content

What's hot

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
 

What's hot (20)

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 

Similar to Shahzad quantum cryptography

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key DistributionIRJET Journal
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
B03250609
B03250609B03250609
B03250609theijes
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptographyAkshay Shelake
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key DistributionXequeMateShannon
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyAndrew Manoske
 
BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks IJECEIAES
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfssuser6602e0
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 

Similar to Shahzad quantum cryptography (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
B03250609
B03250609B03250609
B03250609
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
2. 22796.pdf
2. 22796.pdf2. 22796.pdf
2. 22796.pdf
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Shahzad quantum cryptography

  • 2.  What is Cryptography?  History of Quantum Cryptography  Quantum Cryptography  Heisenberg Uncertainty principle  Polarization of Photon  Quantum Communication Block Diagram  Quantum key Distribution Protocol  Implementing Quantum Cryptography  Advantages & Disadvantages  Conclusion  References CONTENTS :
  • 3. WHAT IS CRYPTOGRAPHY? • Cryptography(derived from Greek word kryptós “hidden secret” and graphein, "to write“) is the science of codes and ciphers. Fig.1 Block Diagram Of Cryptography[1]
  • 4. Fig. 2 -Block Diagram Of Cryptography[2]
  • 5. OTP (ONE TIME PAD) • One-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. • The key used in a one-time pad is called a secret key. • The problem raises how to get the key to the decrypting party safely or how to keep both keys secure. • One-time pads are “information theoretically secure".
  • 6. Fig. 3-OTP Example (William Stalling,Cryptography And Network Security,edition 4th)
  • 7. • Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomenon of quantum physics. • It uses photon and photon’s polarization which is their quantized properties to encode the information . • QKD is a promising technique that ensures unconditionally secure distribution of a secret key, between two end points. Quantum Cryptography :
  • 8. • First proposed by Stephen Wiesner in 1969. • Bennet and Brassard proposed the Quantum key distribution Protocol in 1984. • In 1991, Artur Ekert, developed a different approach to QKD based on peculiar quantum correlations i.e. known as quantum entanglement. HISTORY OF QUANTUM CRYPTOGRAPHY :
  • 9. • Quantum Cryptography is combination of OTP and QKD. • QKD offers an information-theoretically secure solution to the key exchange problem. • Quantum cryptography is based on two important principles- i. Heisenberg’s uncertainty principle ii. Polarization of Photon QUANTUM CRYPTOGRAPHY
  • 10. • It could be used for cryptography was first devised by Stephen Wiesner, a physicist in 1969. • It state that the observer simultaneously cannot measure two physical properties which are related with each other. • With regards to this definition , two examples are referred- i. For a particle P, two physical properties i.e. position and the Momentum cannot be calculated simultaneously. ii. The measurement of a photon cannot be done in rectilinear basis and diagonal basis simultaneously. HEISENBERG’S UNCERTANITY PRINCIPLE :
  • 11. • The process of transforming unpolarized light into polarized light is known as polarization. Fig. 4- Polarization of Photon (Resnick Halliday,Principles Of Physics,edition9th) POLARIZATION OF PHOTON :
  • 12. • The photon is polarized in one of the basis to represent a bit known as a Qubit. • In Polarization of Photons replica of qubits is not possible according to the No Cloning Theorem. • The use of Photons leads to the evolution of Quantum Cryptography.
  • 13. • Polarization of photon is done in rectilinear basis and diagonal basis to represent binary bits .[4] Polarizatio n Basis Binary bit 0° Rectilinear 0 90° Rectilinear 1 45° Diagonal 0 135° Diagonal 1 Figure.5 Polarization of Photons To Represent Bits :
  • 14. • A bit can be in the state 0 or 1 whereas a qubit can occur in the state |0⟩ or |1⟩ . • Superposition state is noted as: |ψ⟩=α|0⟩+β|1 ⟩ • The probability of obtaining |ψ⟩ in |0⟩ state is |α|2 and the probability of obtaining |ψ⟩ in |1 ⟩ state is |β|2. • The probability of getting result of a measurement is obtained by squaring the coefficients. The condition is |α|2 + |β|2 = 1 QUBITS AND QUANTUM STATES :
  • 15. • The state can be written by stacking the two complex number which is a two-dimensional complex unit vector. CONTD…. 𝛼 𝛽 |0⟩ = 1 0 where α=1, 𝛽=0 |1⟩ = 0 1 where α=0, 𝛽=1 Where, |ψ⟩ = cosθ |0⟩+ sinθ |1 ⟩= 𝑐𝑜𝑠θ 𝑠𝑖𝑛θ Figure.6 [4]
  • 16. • Notation 1 and 2 are state 0° and state 90° in rectilinear basis respectively. • Notation 3 and 4 are state 45°and state 135° in diagonal basis respectively. Notation Of Quantum State : 1 √2 ( |0⟩ + |1⟩ ) = | / ⟩ 1 √2 ( |0⟩ - |1⟩ ) = | ⟩ 1. |0⟩ = |−⟩ 2. |1⟩ = | ⃓ ⟩ 3. 4.
  • 17. PROBABILITY OF A PHOTON : 1. Probability of a photon transmitted and produced in same basis and same state 2. Probability of a photon transmitted and produced in same basis but different stat 3. Probability of a photon transmitted and produced in different basis 4. Probability of a photon transmitted in one basis and produced at an angle Figure.7 [4] Figure.8 [4] Figure.9 [4] Figure.10 [4]
  • 18. • Message is send through the public channel while key is send through quantum channel. Figure.11 Quantum Communication [5] QUANTUM COMMUNICATION:
  • 19. QUANTUM KEY DISTRIBUTION PROTOCOLS: • It is a secure communication method which implements a crypto- graphic protocol involving components of quantum mechanics. • QKD can detect any eavesdropping. • QKD is only used to produce and distribute a key, not to transmit any message data. • QKD Protocols are various type- i. BB84 Protocol ii. B92 Protocol iii. Six state Protocol
  • 20. • BB84 was the first security protocol implementing Quantum Key Distribution. • This protocol depended on Heisenberg Uncertainty principle. • It uses the idea of photon polarization. • Communicating parties uses two communication channels – i. classical channel and ii. a quantum channel • Qubits transmitted on the quantum channel and the conventional messages transmitted on classical channel. BB84 PROTOCOL :
  • 22. • It is a modified protocol of BB84 with two states. • A photon polarization of 0° in the rectilinear basis is used to represent binary 0 and 45° in the diagonal basis is binary 1. B92 PROTOCOL : Figure.13 [5]
  • 23. SIX-STATE PROTOCOL (SSP) : • SSP uses six states on three orthogonal basis to encode the bits which are required for communication between entities. • The probability of using one of the basis equals 1/3. Figure.14[5]
  • 24. Implementing Quantum Cryptography : • BBN, Harvard, and Boston University built the DARPA quantum network , the world's first network that delivers end-to-end network security via high-speed quantum key distribution. • This network is suitable for deployment in metro-size areas via standard telecom fiber. • The DARPA security model is the cryptographic virtual private network (VNP).
  • 25. DISADVANTAGES :: • While traveling through the channel (i.e. optical fiber or air)there is possibility of change in polarization of photon due to various causes. • Need of dedicated channel is must between source and destinations which implies high cost. ADVANTAGES : • Used to detect eavesdropping in QKD (Quantum Key Distribution). • Virtually unhackable.
  • 26. CONCLUSION: : • Quantum Cryptography has the potential to make a valuable contribution to the network security among government, businesses and academic sectors. • Prominent technology wherein two entities can communicate securely with the sights of quantum physics. • QKD offers unconditionally secure communication based on quantum mechanics . • Integration of Quantum Cryptography in Wireless Networks has great prospective in terms of better network security.
  • 27. REFERENCES : [1] Roger A. Grimes, “Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto”,Wiley-2020 [2] Jintai Ding ,Rainer Steinwandt, “Post-Quantum Cryptography”: 10th International Conference, Springer, May 2019 [3] Mahdi H. Al Hasani,Kais A. Al Naimee, “Impact security enhancement in chaotic quantum cryptography”,Elsevier, June 2019 [4] Laszlo Gyongyosi, Laszlo Bacsardi, “A Survey on Quantum Key Distribution”:IEEE Infocommunication Journal Vol. XI,2019 [5] V. Padamvathi , B. Vishnu Vardhan , A.V.N. Krishna, " Quantum Cryptography and Quantum Key Distribution Protocols: A Survey “,IEEE 6th International Conference on Advance Computing , Feb 2016. [6] C.H.Bennett, and G. Brassard, " Quantum Cryptography: Public key distribution and coin tossing ",Theoretical Computer Science, Elseiver, vol. 560, 2014.
  • 28. [7] R.Goel , M.Garuba , A.Girma, " Research Directions in Quantum Cryptography", IEEE fourth International Conference on Information Technology, April 2007. [8] M.S. Sharbaf , " Quantum Cryptography: “A New Generation of Information Technology Security System " ,IEEE Sixth International Conference on Information Technology, April 2009.