Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Alice and Bob in the Quantum Wonderland. Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = ? x ? =
Quantum Communication, Teleportation, and Maxwell’s Demon
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Principles of Information Security, 2nd edition1 Cryptography.
Quantum Encryption. Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by.
Cryptographic Technologies
Internet Technology: A Sampler Ramesh Johari Massachusetts Institute of Technology
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Data transmission refers to the movement of data in form of bits between two or more digital devices. This transfer of data takes place via some form.
Encryption Methods By: Michael A. Scott
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Rules of Packet Transmission
Cryptography, Authentication and Digital Signatures
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Cryptography By, Anthony Lonigro & Valentine Mbah.
By Ryan Deetscreek and Greg Goettner
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Atomic Particles  Atoms are made of protons, neutrons and electrons  % of the atom is empty space  Electrons have locations described.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Internetworking Concept and Architectural Model Chapter 3.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Computing Basic Concepts and Applications.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Quantum Computers By Andreas Stanescu Jay Shaffstall.
1 Transmission of Digital Data : Interface and Modems.
Privacy and Integrity: “ Two Essences of Network Security” Presenter Prosanta Gope Advisor Tzonelih Hwang Quantum Information and Network Security Lab,
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Our Proposed Technique
Electronic Data Interchange
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Affinity The degree to which persons like or appreciate one another.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Entangled Electrons.
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Hydrogen Spectrum.
QUANTUM CRYPTOGRAPHY.
Cryptography, part 2.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
Quantum Cryptography Alok.T.J EC 11.
OSI Model The Seven Layers
the communication model
Presentation transcript:

Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews

Conventional Encryption  Data transmission is asynchronous.  Data are sent in groups of photons and translated by the receiving computer.  The encryption key is sent embedded in the data stream and can be intercepted in transit without either party’s knowledge.

Quantum Encryption  Data transmission is synchronous.  Data are sent in weak pulses of photons.  The physical behavior of the particles themselves gives the receiver the encryption key.  If a third party interrupts the data stream, the encryption key is rendered useless and both parties are alerted.  The encryption key isn’t in the message, it is the message.

Why Quantum Encryption Works  Subatomic particles can exist in multiple states until something interacts with them and changes those states.  Heisenberg’s Uncertainty Principle  p  x  1/2*h/2   p  x  1/2*h/2  We can know the location or linear momentum of a particle, but not both. We can know the location or linear momentum of a particle, but not both.  Think of Schrödinger's cat, a quantum mechanical outgrowth of this principle.

Why Quantum Encryption Works, Part 2  It makes use of quantum entanglement, the interdependency of the physical states of quantum particles.  Changing the state of one particle (through observation) changes the state of other particles around it.

How Quantum Encryption Works on the Sender’s End  A laser separates individual photons and sends them to an instrument called a modulator.  The modulator sends the photons to other network nodes via fiber-optic cable.  The photons are encoded by sending them at different time intervals. Chip Elliot, an engineer for BBN Technologies, next to a quantum cryptograph.

How Quantum Encryption Works on the Receiver’s End  The receiver accepts the photons and examines their modulation. If it matches the original one, the encryption key is saved and used to decode data sent over the network through conventional methods, such as the Internet. Martin Jasper of Boston University examines a single photon detector module.

Why Quantum Encryption Is Needed  Many researchers are currently trying to develop quantum computers, which are believed to be capable of exponentially greater computing power than today’s supercomputers.  If quantum computers become a reality before quantum encryption does, modern encryption methods could become obsolete.

Applications of Quantum Encryption  Governmental and intelligence operations  Financial and business transactions  Personal encryption (files, )  Many things no one’s thought of yet

More Information  I found these websites useful.  intro.html intro.html intro.html   n/QuantTeleport/QuantTeleport.html n/QuantTeleport/QuantTeleport.html n/QuantTeleport/QuantTeleport.html  I found very useful an article from the Oct. 4, 2004 St. Louis Post-Dispatch; a somewhat earlier version can be found at AID=/ /BUSINESS01/ AID=/ /BUSINESS01/ AID=/ /BUSINESS01/