-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
By Md Emran Mazumder Ottawa University Student no:
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Cryptography, Authentication and Digital Signatures
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Entangled Electrons.
Quantum Key Distribution in the GÉANT network
Outline The basic authentication problem
Lesson 2-18 AP Computer Science Principles
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
CSc 8320 Advanced Operating Systems Barnali Chakrabarty
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Cryptography & Security
Cryptographic Hash Function
What is network security?
Cryptography.
QUANTUM CRYPTOGRAPHY.
Encryption
Information and Network Security
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Quantum Cryptography Alok.T.J EC 11.
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
CDK: Chapter 7 TvS: Chapter 9
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Fiber Optic Transmission
Security in SDR & cognitive radio
Message Authentication
Presentation transcript:

-SECRECY ENSURED

TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS

 The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication.  Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information.

 The whole point of cryptography is to keep information out of the hands of anyone but its intended recipient.  Even if the message gets intercepted, the meaning won’t be apparent to the intercepted – unless the interceptor is able to decipher it.

Principle of Cryptography.

 Alice wants to send a message to Bob, without an eavesdropper Eve intercepting the message.

CRYPTOGRAPHY Classical Quantum

 Encryption algorithm and related key are kept secret.  Breaking the system is hard due to large numbers of possible keys.  For example: for a key 128 bits long there are – keys to check.

 An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key.  Quantum technology promises to revolutionize secure communication at an even more fundamental level.

 Quantum Cryptography – ensuring the most secure transmission of the secret information – works on the principle of – “ Quantum Mechanics”.  Transmission is carried out at the bit level with the help of various types of alignment of the photons.  It also solves the problem of key distribution arising in the Classical Cryptography.

 A user can suggest a key by sending a series of photons with random polarizations. This sequence can then be used to generate a sequence of numbers. The process is known as quantum key distribution. Main Features:  Key distribution distance: up to 60 km  Key distribution rate: up to 1000 bits/s

 Photon Source.Photon Source.  Photon Detector. Photon Detector.  Communication channel. Communication channel.

 Photon Gun.  Light - emitting p-n junction.  Single ion.

 Avalanche photodiodes.  Germanium detectors.  Silicon.  Photo multiplier.

 Fiber optical communication link.  Free – space laser communication.

 Quantum cryptography obtains its fundamental security from the fact that each qubit of information is carried by a single photon, and that each photon will be altered as soon as it is read once.  This makes impossible to intercept message without being detected.

 The presence of noise can impact detecting attacks.  Eavesdropper and noise on the quantum channel are indistinguishable.  Detecting eavesdropper in the presence of noise is hard.

 messages.  Telephone calls.  Financial Transactions.

 The most important contribution of quantum cryptography is a mechanism for detecting eavesdropping.  Quantum key distribution enables “encrypted communications on demand,” because it allows key generation at transmission time over an unsecured optical communications link.

 We have to use pure fiber optic end-to- end network and boosters are needed at some distance, so it is expensive.  It will also be critical to authenticate the identity of the recipients.  It is also not clear how to modify the scheme in order to deal with noisy quantum transmissions.  It is hard to transmit a photon, entangled over great distances. Photon detectors aren't particularly reliable.

 Currently it works only over short distances, but there are situations in which even short-distance transmission is useful. Also, with sufficient technical improvements, it might be possible in the future to implement quantum cryptography over long distances.  The devices for implementing such methods exist and the performance of demonstration systems is being continuously improved. Within the next few years, such systems could start encrypting some of the most valuable secrets of government and industry.