SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Advances In
Cryptography
Basic Ideas in Cryptography

• Cryptography is the study of sending and receiving secret messages through the help of
cryptosystem.
• The basic idea is to modify a message so as to make it unintelligible to anyone but the intended
recipient

Brought To You By www.rareinput.com
• It’s the transmitting information with access restricted to the intended recipient even if the message is
intercepted by others.
• A typical application of cryptography in network security is to enable two parties to communicate
confidentially over a non-physically secured communication platform such as radio waves, the internet, etc.
• “A little knowledge is a dangerous thing” Very true in cryptography

• Cryptography is of increasing importance in our technological age
Broadcast
Network communications
Internet
E-mail
Cell phones

Brought To You By www.rareinput.com
Advancements in cryptography
[Today’s Talk]
 Quantum Cryptography
 Elliptic Curve Cryptography

Brought To You By www.rareinput.com
I.

Quantum Cryptography

• Quantum cryptography is the single most successful application of Quantum
Computing/Information Theory.
• For the first time in history, we can use the forces of nature to implement perfectly secure
cryptosystems.
• Quantum cryptography describes the use of quantum mechanical effects to perform
cryptographic tasks or to break cryptographic systems.
• The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also
often considered as quantum cryptography.
• Classical Cryptography relies heavily on the complexity of factoring integers.

Brought To You By www.rareinput.com
 Ideas from the Quantum World
• Light waves are propagated as discrete quanta called photons.
• They are massless and have energy momentum and angular momentum called spin.
• Spin carries the polarization.
• If on its way we put a polarization filter a photon may pass through it or may not.
• We can use a detector to check of a photon has passed through a filter.

Brought To You By www.rareinput.com
 Quantum key distribution
• The main key distribution of quantum cryptography is to solve the key distribution system
problem.
• Alice communicates with Bob via a quantum channel sending him photons.
• Then they discuss results using a public channel.
• After getting an encryption key Bob can encrypt his messages and send them by any public
channel.
• Both Alice and Bob have two polarizers each.
• One with the 0-90 degree basis (+) and one with 45-135 degree basis ( )
• Alice uses his polarizers to send randomly photons to Bob in one of the four possible
polarizations 0,45,90,135 degree.

Brought To You By www.rareinput.com
•

•

Bob uses his polarizers to measure each polarization of photons he receives.
He can use the( + )basis or the ( ) but not both simultaneously

Brought To You By www.rareinput.com
 presence of eavesdropping
• If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon.
• If he uses the misaligned filter he will receive no information about the photon .
• Also he will influence the original photon and be unable to retransmit it with the original
polarization.
• Bob will be able to deduce Ave’s presence.

Brought To You By www.rareinput.com
II. Elliptic Curve Cryptography
• Elliptic curve cryptography (ECC) is an approach to public-key
cryptography based on the algebraic structure of elliptic curves over finite
fields.
• ECC was proposed independently by cryptographers Victor Miller (IBM)
and Neal Koblitz (University of Washington) in 1985.
• It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm
Problem (ECDLP)
Like the prime factorization problem.
• ECDLP is another "hard" problem that is simple to state: Given two points,
P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ.
• Elliptic curves combine number theory and algebraic geometry.

Brought To You By www.rareinput.com
Cont..
• An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation:

•

The set of all of the solutions to the equation forms the elliptic curve.
• Elliptic curves have the interesting property that adding two points on the
elliptic curve yields a third point on the curve.
• The point Q is calculated as a multiple of the starting point P
Q = nP
An attacker might know P and Q but finding the integer, n, is a difficult problem to
solve. Q is the
public key, then, and n is the private key.

Brought To You By www.rareinput.com
Advantages & Disadvantages
• Advantages
• fast and compact implementation in hardware
• Shorter keys than RSA
• Disadvantages
• Complex mathematical description
• Short period of research in cryptanalysis (breaking cipher)

Brought To You By www.rareinput.com
 References
• http://en.wikipedia.org/wiki/Quantum_cryptography
• www.google.com
• http://www.springerreference.com/docs/html/chapterdbid/71039.html

Brought To You By www.rareinput.com
Thank
You
Shailesh Tyagi
Developer
www.rareinput.com

Weitere ähnliche Inhalte

Andere mochten auch

High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
Agate Studio
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 

Andere mochten auch (20)

Week13
Week13Week13
Week13
 
How circuit switches
How circuit switchesHow circuit switches
How circuit switches
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
Crytography
CrytographyCrytography
Crytography
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Crytography
CrytographyCrytography
Crytography
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Aes
AesAes
Aes
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Ähnlich wie Advances In Cryptography

Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 

Ähnlich wie Advances In Cryptography (20)

Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Advances In Cryptography

  • 2. Basic Ideas in Cryptography • Cryptography is the study of sending and receiving secret messages through the help of cryptosystem. • The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient Brought To You By www.rareinput.com
  • 3. • It’s the transmitting information with access restricted to the intended recipient even if the message is intercepted by others. • A typical application of cryptography in network security is to enable two parties to communicate confidentially over a non-physically secured communication platform such as radio waves, the internet, etc. • “A little knowledge is a dangerous thing” Very true in cryptography • Cryptography is of increasing importance in our technological age Broadcast Network communications Internet E-mail Cell phones Brought To You By www.rareinput.com
  • 4. Advancements in cryptography [Today’s Talk]  Quantum Cryptography  Elliptic Curve Cryptography Brought To You By www.rareinput.com
  • 5. I. Quantum Cryptography • Quantum cryptography is the single most successful application of Quantum Computing/Information Theory. • For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. • Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks or to break cryptographic systems. • The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also often considered as quantum cryptography. • Classical Cryptography relies heavily on the complexity of factoring integers. Brought To You By www.rareinput.com
  • 6.  Ideas from the Quantum World • Light waves are propagated as discrete quanta called photons. • They are massless and have energy momentum and angular momentum called spin. • Spin carries the polarization. • If on its way we put a polarization filter a photon may pass through it or may not. • We can use a detector to check of a photon has passed through a filter. Brought To You By www.rareinput.com
  • 7.  Quantum key distribution • The main key distribution of quantum cryptography is to solve the key distribution system problem. • Alice communicates with Bob via a quantum channel sending him photons. • Then they discuss results using a public channel. • After getting an encryption key Bob can encrypt his messages and send them by any public channel. • Both Alice and Bob have two polarizers each. • One with the 0-90 degree basis (+) and one with 45-135 degree basis ( ) • Alice uses his polarizers to send randomly photons to Bob in one of the four possible polarizations 0,45,90,135 degree. Brought To You By www.rareinput.com
  • 8. • • Bob uses his polarizers to measure each polarization of photons he receives. He can use the( + )basis or the ( ) but not both simultaneously Brought To You By www.rareinput.com
  • 9.  presence of eavesdropping • If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon. • If he uses the misaligned filter he will receive no information about the photon . • Also he will influence the original photon and be unable to retransmit it with the original polarization. • Bob will be able to deduce Ave’s presence. Brought To You By www.rareinput.com
  • 10. II. Elliptic Curve Cryptography • Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. • ECC was proposed independently by cryptographers Victor Miller (IBM) and Neal Koblitz (University of Washington) in 1985. • It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) Like the prime factorization problem. • ECDLP is another "hard" problem that is simple to state: Given two points, P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ. • Elliptic curves combine number theory and algebraic geometry. Brought To You By www.rareinput.com
  • 11. Cont.. • An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation: • The set of all of the solutions to the equation forms the elliptic curve. • Elliptic curves have the interesting property that adding two points on the elliptic curve yields a third point on the curve. • The point Q is calculated as a multiple of the starting point P Q = nP An attacker might know P and Q but finding the integer, n, is a difficult problem to solve. Q is the public key, then, and n is the private key. Brought To You By www.rareinput.com
  • 12. Advantages & Disadvantages • Advantages • fast and compact implementation in hardware • Shorter keys than RSA • Disadvantages • Complex mathematical description • Short period of research in cryptanalysis (breaking cipher) Brought To You By www.rareinput.com
  • 13.  References • http://en.wikipedia.org/wiki/Quantum_cryptography • www.google.com • http://www.springerreference.com/docs/html/chapterdbid/71039.html Brought To You By www.rareinput.com

Hinweis der Redaktion

  1. Changing a and b changes the shape of the curve, and small changes in these parameters can result in major changes in the set of (x,y) solutions.