Group 7 Justin Jones Ashley Robinett Jonathan Bull

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
The Bohr Model 2: Quantum Mechanics.
Quantum Encryption. Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
1 PHY093 Physics 1 Introduction. 2 Physics (Giancoli)  The most basic of the sciences  Deals with behavior and structure of matter  Usually divided.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
 14.1 The Uncertainty Principle  14.2 The Effect of Observation  14.4 Quantum Reality  14.5 Toward a Post-Newtonian Worldview  14.6 Observing Atomic.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
1 Ch 4 Electron Energies. 2 Electromagnetic Spectrum Electromagnetic radiation is a form of energy that exhibits wave-like behavior as it travels though.
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
The Atom, Light, and Quantum Mechanics rth_the_key_to_success_grit.
Slide 1 of 38 chemistry. © Copyright Pearson Prentice Hall Slide 2 of 38 Physics and the Quantum Mechanical Model Neon advertising signs are formed from.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Arrangement of Electrons in Atoms
Explain why different colors of light result
12.10 The Wave Motion of Matter & Quantum Mechanics Since light behaves as waves and particles, Louis de Broglie, questioned whether particles matter behaved.
Unanswered Questions Rutherford’s model did not address the following questions: What is the arrangement of electrons in the atom? What keeps the electrons.
Unanswered Questions Rutherford’s model did not address the following questions: 1. What is the arrangement of electrons in the atom? 2. What keeps the.
The Quantum Mechanical Model of the Atom. Niels Bohr In 1913 Bohr used what had recently been discovered about energy to propose his planetary model of.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Quantum Mechanical Model of Atom. Name This Element.
Electronic Banking & Security Electronic Banking & Security.
QUANTUM PHYSICS BY- AHRAZ, ABHYUDAI AND AKSHAY LECTURE SECTION-5 GROUP NO. 6.
Properties of light spectroscopy quantum hypothesis hydrogen atom Heisenberg Uncertainty Principle orbitals ATOMIC STRUCTURE Kotz Ch 7 & Ch 22 (sect 4,5)
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Quantum Key Distribution in the GÉANT network
Chapter 5: Electron Configurations
COMPSCI 290.2: Computer Security
To Address These Questions, We Will Study:
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Hydrogen Spectrum.
Electromagnetic Radiation
QUANTUM CRYPTOGRAPHY.
Big Numbers: Mathematics and Internet Commerce
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Ch. 4.2 Quantum Model of the Atom
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Physics and the Quantum Mechanical Model
The Quantum Model of the Atom.
Quantum Cryptography Alok.T.J EC 11.
Matter is a Wave Does not apply to large objects
The Quantum Model.
Chapter 4 Electrons as Waves
Quantum Cryptography Scott Roberts CSE /01/2001.
The Quantum Model of the Atom
Cryptography and Quantum Computing
Quantum Technology programme
Quantum Mechanics and Configuration
Schrödinger's/ Modern model of the atom
Fiber Optic Transmission
Quantum Mechanics College Chemistry.
Quantum Theory Electrons!.
Do Now (3B/4B) Take-out: Be ready to review p. 12 at the bell! Paper
Schrödinger's/ Modern model of the atom
To Address These Questions, We Will Study:
Presentation transcript:

Group 7 Justin Jones Ashley Robinett Jonathan Bull Quantum Cryptography Group 7 Justin Jones Ashley Robinett Jonathan Bull

Quantum Cryptography Key Words Classical Cryptography Quantum Physics Photons Eavesdropping Heisenberg’s Uncertainty Principle

Quantum Cryptography Classical Cryptography- uses mathematical techniques to restrict eavesdroppers Quantum Cryptography- uses quantum physics to restrict eavesdroppers Quantum Physics- the branch of physics that deals with atomic and subatomic particles and the energy of atoms

Quantum Cryptography Photon- one of the elementary particles whose interactions with electrons and atomic nuclei account for the features of matter Eavesdropping- the intercepting of conversations by unintended recipients Heisenberg’s Uncertainty Principle- tells us that merely observing a quantum object alters it

Quantum Cryptography What It Is Developed by Stephen Weisner in the early 1970’s In 1991, the first prototype was made operable only over a distance of 32 centimeters (February 2006) Hoi-Kwong Lo’s study describes the first experimental proof of a quantum decoy technique to encrypt data over a fiber optic cable

Quantum Cryptography Varies the intensity of photons and introduces “photonic decoys” Photons carry complex encryption keys through fiber optic cables Afterwards, a second broadcast tells the receiving computer which photons carried the signal and which ones were decoys

Quantum Cryptography If a hacker tries to eavesdrop on the data stream to try and figure out the encryption key, the mere act of eavesdropping changes the decoys- which tells the computer that the data has been tampered with

Quantum Cryptography Benefits Allows the transmission of sensitive information (banking records, personal info, etc.) Allows more security for online banking Can be implemented now because the experiment was done with a commercial device

Quantum Cryptography Benefits Increases the distance that information can sent up to 100 km Confuses hackers and eavesdroppers Merely looking electronically at the photon keys will automatically change their shape and render them useless in unlocking the information Both sender and receiver can know if someone is eavesdropping or not