SlideShare ist ein Scribd-Unternehmen logo
1 von 28
QUANTUM CRYPTOGRAPHY
A
Seminar Presentation
On
SEMINAR
COORDINATOR:
Mr. Manas Singhal
(Assistant Professor)
SEMINAR GUIDE:
Mrs.SHUCHITA SEXANA
(Assistant Professor)
PRESENTED BY:
NAMAN KUMAR
(1208231100)
EC 3rd Year
Section: J
MIT(MORADABAD)
1
CONTENT
 Basic terms
 What is cryptography?
 The process
 Advantages and Limitations of cryptography
 RSA Crypto Scheme
 OTP (One Time Pad)
 Public Key Cryptography
 QKD (Quantum Key Distribution)
 What is quantum cryptography?
 Polarization of light
 Heisenberg’s Uncertainty Principle
 Element of quantum theory
 Qubits
 Quantum communication
 BB84 Protocol
 Advantages and Disadvantages of Quantum cryptography
 Future aspect
 Conclusion
 Refrences1
1
BASIC TERMS
 Plain Text -Plain text is a pure sequence of character codes.
Basically its is original message.
 Encryption Algorithm – It is the process of encoding
messages or information in such a way that only authorized
parties can read it.
 Cipher Text -Cipher text is also known as encrypted or
encoded information. Its is the combination of key and plain
text.
 Decryption Algorithm – It is reverse process of encryption.
 Eavesdropping- It is secretly listening to the private
conversation of others without their consent.
2
WHAT IS CRYPTOGRAPHY?
 Cryptography (derived from the Greek words kryptos and
graphein meaning hidden writing) is the science of codes and
ciphers.
 Cryptography is the art of encoding and decoding messages of
secure communications.
 Cryptography is of increasing importance in our technological
age using broadcast, network communications, Internet ,e-mail
etc.
3
4
 Encrypted messages can sometimes be broken by
cryptanalysis, also called code-breaking, although modern
cryptograph techniques are virtually unbreakable.
Fig.1-Block diagram of cryptography
eavesdropping
1 5
THE PROCESS
Fig. 2- Process of cryptography
A
-A
1 6
ADVANTAGES OF CRYPTOGRAPHY
 It hides the message and your privacy is safe.
 Only the person who have the key would be able to
read the desired message.
LIMITATIONS
 Key can be hacked easily.
 Not efficient.
1 7
RSA CRYPTOGRAPHY
 RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
 RSA consist a single key.
It provide more security but still it can be hacked.
It take lot of time to generate and regenerate the code.
1 8
OTP (ONE TIME PAD)
 One-time pad (OTP) is an encryption technique that cannot be
cracked if used correctly.
Fig.3- Example of one time pad
1 9
 Here the problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
 One-time pads have sometimes been used when the both
parties started out at the same physical location and then
separated, each with knowledge of the keys in the one-time
pad.
 The key used in a one-time pad is called a secret key.
 Ideally destroy the key after use, to make your data to more
secure.
 Key distribution problem led to the invention of public
key cryptography.
1 10
PUBLIC KEY CRYPTOGRAPHY
 Public-key cryptography, also known as asymmetric
cryptography.
 Requires two separate key, one of which is secret (or private)
and one of which is public.
 It has better speed and less complicated then RSA and one time
pad .
 But still there is a problem that is , it can also be hacked.
1 11
QUANTUM KEY DISTRIBUTION
 Quantum key distribution (QKD) uses quantum mechanics
to guarantee secure communication.
 Quantum Key Distribution tell us all attempts of
eavesdropping.
 Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
 It enables two parties to produce a shared random bit string
known only to them, which can be used as a key for
encryption and decryption.
1 12
It is more secure then others schemes.
There is a problem that the finest optical fiber have limit
of 50 km.
1 13
WHAT IS QUANTUM CRYPTOGRAPHY ?
 Although the field of cryptography is ancient, but it is not
static. Quantum cryptography is a relatively new concept in
cryptography.
 Basically quantum cryptography is combination of OTP and
QKD.
 Quantum cryptography is based on two important
principles –
a) Polarization of light.
b) Heisenberg’s uncertainty principle.
1 14
POLARIZATION OF LIGHT
 Polarized light waves are light waves in which the
vibrations occur in a single plane.
 The process of transforming unpolarized
light into polarized light is known as polarization.
 Symbols:-
Horizontal polarizations→
Vertical polarization - ↑
45° polarization - ↗
135° polarization - ↖
Fig.4- Polarization of light
1 15
HEISENBERG’S UNCERTANITY PRINCIPLE
 According to the principle two interrelated properties
cannot be measured individually without affecting the
other.
 The principle is that you cannot partition the photon
into two halves without affect it value.
 So if someone tries to detect the state of photons being
send over to the receiver the error can be detected.
1 16
ELEMENT OF QUANTAM CRYPTOGRAPHY
 Light waves are propagated as discrete quanta called photons.
 Photons are massless but they have energy, momentum and
angular momentum which is called spin.
 Spin carries the polarization.
 If on its way we put a polarization filter a photon may pass
through it or may not.
 We can use a detector to check of a photon that has passed
through a filter
1 17
QUBITS
 A quantum bit or qubit is a unit of quantum information.
 Qubits are not like to simple bits because they have equal
possibility.
 Exists as a ‘0’, a ‘1’ or simultaneously as a superposition
of both ‘0’ & ‘1’ .
 Though the amount of information that can be retrieved in
a single qubit is equal to one bit, the difference lies in the
processing of information.
1 18
QUANTUM COMMUNICATION
Here the message is send through the public network where as
key send is through quantum channel.
Fig.5- Quantum communication
1 19
BB84 PROTOCOL
 BB84 was the first security protocol implementing Quantum
Key Distribution.
 It uses the idea of photon polarization.
 The key consists of bits that will be transmitted as photons.
 Each bit is encoded with a random polarization basis!
 First thing is matter in it that is secure connection.
 After that the connection is secure and no need to distribution
of key again and again,
1 20
Table 1 -Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The bits allow Alice and
Bob to secure the channel
for key distribution.
× + × +
0 0 1 1
Table 2- Basis value
1 21
Table 3- Getting the final key basis
As long as no errors
and/or eavesdropping
have occurred. Alice
and Bob have now made
sure that the channel is
secure.
Alice’s
Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s
Bit 0 0 0 1 1
1 22
 The first prototype implementation of quantum
cryptography was built at IBM(International Business
Machine) on 1989.
Fig.6- First prototype
1 23
ADVANTAGES OF QUANTUM
CRYPTOGRAPHY
 Advantages of Quantum cryptography is un-hackable.
 Simple to use.
DISADVANTAGES
 Quantum cryptography the signal is currently limited to approx.
50 km.
 Setup is expensive.
1 24
FUTURE ASPECT
 Find the another path for key distribution because of the
limitation of quantum cable.
 Make it more secure , so that in future also it can’t be
hacked.
1 25
CONCLUSION
 Quantum cryptography is a major achievement in security
engineering.
 It secure our data transmission as it is never before.
 Easy to understand and easy to use.
 As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry.
1 26
REFRENCES
 Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography:
Realizing next generation information security”ISSN 2319 – 4847,Volume
3, Issue 2, February 2014 pp. 286-289.
 Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 –
4847,Volume 3, Issue 2, February 2014. pp. 305-330.
 Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New
Approach of Quantum Cryptography in Network Security” ISSN 2250-
2459, Volume 3, Special Issue 2, January 2013 pp.122-126.
 G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum
Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544
1 27
THANK YOU
1 28

Weitere ähnliche Inhalte

Was ist angesagt?

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptographyFarah Shaikh
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream CiphersSam Bowne
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum Internet By Professor Lili Saghafi
Quantum Internet By Professor Lili SaghafiQuantum Internet By Professor Lili Saghafi
Quantum Internet By Professor Lili SaghafiProfessor Lili Saghafi
 

Was ist angesagt? (20)

Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
History of cryptography
History of cryptographyHistory of cryptography
History of cryptography
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Internet By Professor Lili Saghafi
Quantum Internet By Professor Lili SaghafiQuantum Internet By Professor Lili Saghafi
Quantum Internet By Professor Lili Saghafi
 

Andere mochten auch

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice PortalSeanHart1766
 
IB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by NothingnerdyIB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by NothingnerdyNothingnerdy
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesMaria Stylianou
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Build Lightmap system
Build Lightmap systemBuild Lightmap system
Build Lightmap systemJaesik Hwang
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000mCAA Sudan
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptographyspreedniels
 

Andere mochten auch (15)

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice Portal
 
IB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by NothingnerdyIB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by Nothingnerdy
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Build Lightmap system
Build Lightmap systemBuild Lightmap system
Build Lightmap system
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
abledit Solutions
abledit Solutionsabledit Solutions
abledit Solutions
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000m
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
 

Ähnlich wie Naman quantum cryptography

Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption KeyIOSR Journals
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
B03250609
B03250609B03250609
B03250609theijes
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsOfer Rivlin, CISSP
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 

Ähnlich wie Naman quantum cryptography (20)

Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
B03250609
B03250609B03250609
B03250609
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 

Kürzlich hochgeladen

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Kürzlich hochgeladen (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Naman quantum cryptography

  • 1. QUANTUM CRYPTOGRAPHY A Seminar Presentation On SEMINAR COORDINATOR: Mr. Manas Singhal (Assistant Professor) SEMINAR GUIDE: Mrs.SHUCHITA SEXANA (Assistant Professor) PRESENTED BY: NAMAN KUMAR (1208231100) EC 3rd Year Section: J MIT(MORADABAD) 1
  • 2. CONTENT  Basic terms  What is cryptography?  The process  Advantages and Limitations of cryptography  RSA Crypto Scheme  OTP (One Time Pad)  Public Key Cryptography  QKD (Quantum Key Distribution)  What is quantum cryptography?  Polarization of light  Heisenberg’s Uncertainty Principle  Element of quantum theory  Qubits  Quantum communication  BB84 Protocol  Advantages and Disadvantages of Quantum cryptography  Future aspect  Conclusion  Refrences1 1
  • 3. BASIC TERMS  Plain Text -Plain text is a pure sequence of character codes. Basically its is original message.  Encryption Algorithm – It is the process of encoding messages or information in such a way that only authorized parties can read it.  Cipher Text -Cipher text is also known as encrypted or encoded information. Its is the combination of key and plain text.  Decryption Algorithm – It is reverse process of encryption.  Eavesdropping- It is secretly listening to the private conversation of others without their consent. 2
  • 4. WHAT IS CRYPTOGRAPHY?  Cryptography (derived from the Greek words kryptos and graphein meaning hidden writing) is the science of codes and ciphers.  Cryptography is the art of encoding and decoding messages of secure communications.  Cryptography is of increasing importance in our technological age using broadcast, network communications, Internet ,e-mail etc. 3 4
  • 5.  Encrypted messages can sometimes be broken by cryptanalysis, also called code-breaking, although modern cryptograph techniques are virtually unbreakable. Fig.1-Block diagram of cryptography eavesdropping 1 5
  • 6. THE PROCESS Fig. 2- Process of cryptography A -A 1 6
  • 7. ADVANTAGES OF CRYPTOGRAPHY  It hides the message and your privacy is safe.  Only the person who have the key would be able to read the desired message. LIMITATIONS  Key can be hacked easily.  Not efficient. 1 7
  • 8. RSA CRYPTOGRAPHY  RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.  RSA consist a single key. It provide more security but still it can be hacked. It take lot of time to generate and regenerate the code. 1 8
  • 9. OTP (ONE TIME PAD)  One-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. Fig.3- Example of one time pad 1 9
  • 10.  Here the problem raises how to get the key to the decrypting party safely or how to keep both keys secure.  One-time pads have sometimes been used when the both parties started out at the same physical location and then separated, each with knowledge of the keys in the one-time pad.  The key used in a one-time pad is called a secret key.  Ideally destroy the key after use, to make your data to more secure.  Key distribution problem led to the invention of public key cryptography. 1 10
  • 11. PUBLIC KEY CRYPTOGRAPHY  Public-key cryptography, also known as asymmetric cryptography.  Requires two separate key, one of which is secret (or private) and one of which is public.  It has better speed and less complicated then RSA and one time pad .  But still there is a problem that is , it can also be hacked. 1 11
  • 12. QUANTUM KEY DISTRIBUTION  Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication.  Quantum Key Distribution tell us all attempts of eavesdropping.  Quantum key distribution is only used to produce and distribute a key, not to transmit any message data  It enables two parties to produce a shared random bit string known only to them, which can be used as a key for encryption and decryption. 1 12
  • 13. It is more secure then others schemes. There is a problem that the finest optical fiber have limit of 50 km. 1 13
  • 14. WHAT IS QUANTUM CRYPTOGRAPHY ?  Although the field of cryptography is ancient, but it is not static. Quantum cryptography is a relatively new concept in cryptography.  Basically quantum cryptography is combination of OTP and QKD.  Quantum cryptography is based on two important principles – a) Polarization of light. b) Heisenberg’s uncertainty principle. 1 14
  • 15. POLARIZATION OF LIGHT  Polarized light waves are light waves in which the vibrations occur in a single plane.  The process of transforming unpolarized light into polarized light is known as polarization.  Symbols:- Horizontal polarizations→ Vertical polarization - ↑ 45° polarization - ↗ 135° polarization - ↖ Fig.4- Polarization of light 1 15
  • 16. HEISENBERG’S UNCERTANITY PRINCIPLE  According to the principle two interrelated properties cannot be measured individually without affecting the other.  The principle is that you cannot partition the photon into two halves without affect it value.  So if someone tries to detect the state of photons being send over to the receiver the error can be detected. 1 16
  • 17. ELEMENT OF QUANTAM CRYPTOGRAPHY  Light waves are propagated as discrete quanta called photons.  Photons are massless but they have energy, momentum and angular momentum which is called spin.  Spin carries the polarization.  If on its way we put a polarization filter a photon may pass through it or may not.  We can use a detector to check of a photon that has passed through a filter 1 17
  • 18. QUBITS  A quantum bit or qubit is a unit of quantum information.  Qubits are not like to simple bits because they have equal possibility.  Exists as a ‘0’, a ‘1’ or simultaneously as a superposition of both ‘0’ & ‘1’ .  Though the amount of information that can be retrieved in a single qubit is equal to one bit, the difference lies in the processing of information. 1 18
  • 19. QUANTUM COMMUNICATION Here the message is send through the public network where as key send is through quantum channel. Fig.5- Quantum communication 1 19
  • 20. BB84 PROTOCOL  BB84 was the first security protocol implementing Quantum Key Distribution.  It uses the idea of photon polarization.  The key consists of bits that will be transmitted as photons.  Each bit is encoded with a random polarization basis!  First thing is matter in it that is secure connection.  After that the connection is secure and no need to distribution of key again and again, 1 20
  • 21. Table 1 -Comparing measurements Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 The bits allow Alice and Bob to secure the channel for key distribution. × + × + 0 0 1 1 Table 2- Basis value 1 21
  • 22. Table 3- Getting the final key basis As long as no errors and/or eavesdropping have occurred. Alice and Bob have now made sure that the channel is secure. Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 1 22
  • 23.  The first prototype implementation of quantum cryptography was built at IBM(International Business Machine) on 1989. Fig.6- First prototype 1 23
  • 24. ADVANTAGES OF QUANTUM CRYPTOGRAPHY  Advantages of Quantum cryptography is un-hackable.  Simple to use. DISADVANTAGES  Quantum cryptography the signal is currently limited to approx. 50 km.  Setup is expensive. 1 24
  • 25. FUTURE ASPECT  Find the another path for key distribution because of the limitation of quantum cable.  Make it more secure , so that in future also it can’t be hacked. 1 25
  • 26. CONCLUSION  Quantum cryptography is a major achievement in security engineering.  It secure our data transmission as it is never before.  Easy to understand and easy to use.  As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry. 1 26
  • 27. REFRENCES  Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography: Realizing next generation information security”ISSN 2319 – 4847,Volume 3, Issue 2, February 2014 pp. 286-289.  Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 – 4847,Volume 3, Issue 2, February 2014. pp. 305-330.  Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New Approach of Quantum Cryptography in Network Security” ISSN 2250- 2459, Volume 3, Special Issue 2, January 2013 pp.122-126.  G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544 1 27