SlideShare ist ein Scribd-Unternehmen logo
1 von 27
The art and science of concealing the messages to introduce secrecy in
information security is recognized as cryptography.
Word Cryptography comes from greek word:
Cryptography=Krypto + graphene
“Secret Writing”.
WHAT IS QUANTUM?
A quantum is a minimum amount of any physical entity involved in an
interaction.
The fundamental notion that a physical property may be "quantized" is
referred to as "the hypothesis of quantization".
Word Quantum comes from Latin ‘quantus’ means “how great”.
?
Science of exploiting quantum mechanical properties to
perform cryptographic tasks.
Method of coding information based on quantum mechanics, which is said
to be unbreakable.
. It uses current knowledge of physics to develop a cryptosystem i.e. not able
to be defeated .
History
Proposed first by Stephen Wiesner in 1970’s.
Uses Heisenberg's uncertainty principle formulated in 1927.
Quantum Key Distribution
Process of using quantum communication to establish a shared key between
two parties without a third party learning anything about that key, even if
Eve can eavesdrop on all communication between Alice and Bob.
If Eve tries to learn information about the key being established, key
establishment will fail causing Alice and Bob to notice.
How Quantum Cryptography Works?
 QKD uses quantum mechanics to guarantee secure communication.
 Enables two parties to produce a shared random secret key known only to
them, which used to encrypt and decrypt messages.
In quantum computing, a qubit or quantum bit is a unit of quantum
information.
The state of a qubit can be in a ‘superposition' of 0 and 1 simultaneously.
QUANTUM PROPERTIES
a)
• A single photon is emitted from a light source and passes through a linear
polarizer, in this case - horizontal. That process creates a qubit with
horizontal polarization.
b)
• When the horizontally-polarized photon passes through a
horizontally/vertically-oriented polarizing beamsplitter, it always retains its
horizontal polarization.
c)
• If that horizontally-polarized photon passes through a diagonally-oriented polarizing
beamsplitter:
-There is a 50% probability of finding the photon at one of the exits.
-The photon will only be detected at one of the exits.
-The polarization of the photon will have changed to the corresponding diagonal polarization.
Spin values
BB84 Protocol
• Relies on quantum indeterminism and no-cloning theorem.
• Can be used between Alice and Bob to “negotiate” a key through a quantum
channel + a classical channel.
• Key is generated on-the-fly.
The BB84 Protocol’s steps
1) Key transmission through the quantum channel .
2) Error correction
3) Key distillation
Eve Possible Attacks
Cloning the photon
Intercept-resend
Intercept the public classical channel
Spoofing attack through the public channel
Why Quantum Cryptography?
• only known method for transmitting a secret key over distance that is secure
in principle and based on the laws of physics.
Why Quantum Cryptography So Secure?
• The quantum no-cloning theorem states that an unknown quantum state
cannot be cloned.
• In a quantum system, which can be in one of two states, any attempt to
measure the quantum state will disturb the system. A quantum message that
is intercepted and read by an eavesdropper will reproduce in a confused and
distorted way and useless to the intended recipient of the message.
• The effects produced by measuring a quantum property are irreversible.
Weaknesses and Limitation of Quantum
Cryptography
Only works along unbroken and relatively short fiber optic cables.
Doesn’t solve authentication problem.
Doesn’t address some of the weakest links in data security such as human
corruptibility and key storage.
Relatively high cost.
Advantages
Virtually Un-hackable
Simple to use
Less resources needed to maintain it
Used to detect eavesdropping in Quantum Key Distribution
Disadvantages
The signal is currently limited to 90 miles.
Could replace a lot of jobs.
Conclusion
Due to the high cost of implementation and the adequacy of current
cryptological methods, it is unlikely that quantum cryptography will be
in widespread use for several years.
Quantum Cryptography

Weitere ähnliche Inhalte

Was ist angesagt?

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 

Was ist angesagt? (20)

quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Cryptography its history application and beyond
Cryptography its history application and beyondCryptography its history application and beyond
Cryptography its history application and beyond
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 

Ähnlich wie Quantum Cryptography

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
ssuser6602e0
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 

Ähnlich wie Quantum Cryptography (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum
QuantumQuantum
Quantum
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Quantum Cryptography

  • 1.
  • 2.
  • 3. The art and science of concealing the messages to introduce secrecy in information security is recognized as cryptography. Word Cryptography comes from greek word: Cryptography=Krypto + graphene “Secret Writing”.
  • 5. A quantum is a minimum amount of any physical entity involved in an interaction. The fundamental notion that a physical property may be "quantized" is referred to as "the hypothesis of quantization". Word Quantum comes from Latin ‘quantus’ means “how great”.
  • 6. ?
  • 7. Science of exploiting quantum mechanical properties to perform cryptographic tasks. Method of coding information based on quantum mechanics, which is said to be unbreakable. . It uses current knowledge of physics to develop a cryptosystem i.e. not able to be defeated .
  • 8. History Proposed first by Stephen Wiesner in 1970’s. Uses Heisenberg's uncertainty principle formulated in 1927.
  • 9. Quantum Key Distribution Process of using quantum communication to establish a shared key between two parties without a third party learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob. If Eve tries to learn information about the key being established, key establishment will fail causing Alice and Bob to notice.
  • 10. How Quantum Cryptography Works?  QKD uses quantum mechanics to guarantee secure communication.  Enables two parties to produce a shared random secret key known only to them, which used to encrypt and decrypt messages. In quantum computing, a qubit or quantum bit is a unit of quantum information. The state of a qubit can be in a ‘superposition' of 0 and 1 simultaneously.
  • 12. a) • A single photon is emitted from a light source and passes through a linear polarizer, in this case - horizontal. That process creates a qubit with horizontal polarization.
  • 13. b) • When the horizontally-polarized photon passes through a horizontally/vertically-oriented polarizing beamsplitter, it always retains its horizontal polarization.
  • 14. c) • If that horizontally-polarized photon passes through a diagonally-oriented polarizing beamsplitter: -There is a 50% probability of finding the photon at one of the exits. -The photon will only be detected at one of the exits. -The polarization of the photon will have changed to the corresponding diagonal polarization.
  • 16. BB84 Protocol • Relies on quantum indeterminism and no-cloning theorem. • Can be used between Alice and Bob to “negotiate” a key through a quantum channel + a classical channel. • Key is generated on-the-fly.
  • 17. The BB84 Protocol’s steps 1) Key transmission through the quantum channel . 2) Error correction 3) Key distillation
  • 18.
  • 19.
  • 20. Eve Possible Attacks Cloning the photon Intercept-resend Intercept the public classical channel Spoofing attack through the public channel
  • 21. Why Quantum Cryptography? • only known method for transmitting a secret key over distance that is secure in principle and based on the laws of physics.
  • 22. Why Quantum Cryptography So Secure? • The quantum no-cloning theorem states that an unknown quantum state cannot be cloned. • In a quantum system, which can be in one of two states, any attempt to measure the quantum state will disturb the system. A quantum message that is intercepted and read by an eavesdropper will reproduce in a confused and distorted way and useless to the intended recipient of the message. • The effects produced by measuring a quantum property are irreversible.
  • 23. Weaknesses and Limitation of Quantum Cryptography Only works along unbroken and relatively short fiber optic cables. Doesn’t solve authentication problem. Doesn’t address some of the weakest links in data security such as human corruptibility and key storage. Relatively high cost.
  • 24. Advantages Virtually Un-hackable Simple to use Less resources needed to maintain it Used to detect eavesdropping in Quantum Key Distribution
  • 25. Disadvantages The signal is currently limited to 90 miles. Could replace a lot of jobs.
  • 26. Conclusion Due to the high cost of implementation and the adequacy of current cryptological methods, it is unlikely that quantum cryptography will be in widespread use for several years.

Hinweis der Redaktion

  1.  the smallest possible discrete unit of any physical property, such as energy or matter.