Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Cryptography The science of writing in secret code.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Quantum Cryptography Marshall Roth March 9, 2007.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Gagan Deep Singh GTBIT (IT) August 29,2009.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Overview and Basic Concepts Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus -
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Encryption.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
Nawaf M Albadia
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Stacey Levine. History of cryptography Why cryptography? Private Key Systems Public Key Systems Comparisons and PEM (not) The future - Quantum Cryptography.
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
CIT 380: Securing Computer Systems
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Cryptography.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Basic of Modern Cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age

What is Cryptography? Cryptography is a way of disguising information so that it can can be transmitted while entirely restricting the contents to its intended recipient(s), even if the transmission is received by others. Some Major Applications: To protect privacy, confidentiality Insuring data integrity - detecting and preventing unauthorized data manipulation Authentication - the means by which two parties can positively identify each other Non-repudiation - to hold people responsible for their actions.

Crypto = Secret Graphy = Writing First recorded use of cryptography is 1900 BC by the use of non-standard hieroglyphics. Some Historical Perspective German Enigma Machine – The outcome of WWII may have largely been due to the breaking of the cipher by the Allied Powers. Julius Caesar and his simple mono-alphabetic substitution cipher or “Shift by n” method.

A Brief Lesson in Cryptography Vocabulary: Plaintext – the original message. Cipher text – the disguised message. Key – A set of parameters supplied to encryption and decryption algorithms. Encryption – using a key to change plaintext into ciphertext. Decryption – using a key to change cipher text back into something readable. Perhaps the most straightforward example is to be found using the simple mono-alphabetic substitution cipher method, in which each letter in the alphabet is shifted by an integer value. The key supplied to this algorithm would be that integer value. However, a problem arises in sharing the key with the intended recipient without letting it be discovered by others.

More… One of the most common modes of modern encryption uses a protocol commonly known as PGP. This stands for “Pretty Good Privacy”, and uses a system of two keys, therefore bypassing the key distribution problem. The public key is a one-way algorithm for encrypting data. Each user has a public key and a private key. Once information has been converted to cipher text and delivered, the recipient can decrypt the data using their private key. Public key encryption algorithms exploit the fact that some mathematical operations are easier to do in one direction. Unfortunately, when computing technology and modern mathematics render current algorithms (which often depend on the difficulty of factoring large integers) obsolete, the system of two keys will no longer be secure.

Quantum computing and mathematical advances may soon render current cipher algorithms obsolete. Classical cryptography techniques allow the key transmission to be passively monitored without alerting the legitimate users. Why Quantum Cryptography? Luckily, quantum cryptography addresses both of these issues!

Q.C. – An Overview The Quantum Cryptosystem : Basic Operation 1.“Alice” prepares a series of photons with random polarizations – either 45, 90, 135, or 180 degrees. She sends these photons to “Bob” over a quantum channel. 2.Bob measures the photons. He randomly chooses a filter by which to measure the incoming photons, and records which filter he uses. If he measures 45 or 90 degrees, a 0 bit is recorded; if he measures 135 or 180 degrees, a 1 bit is recorded. 3.Using a normal, unsecured channel, Alice and Bob communicate to find which bits Bob used the correct filter for. These values are now become a secret key between Alice and Bob. 4.Error correction processes performed by Alice and Bob can be performed to determine if “Eve” was eavesdropping on the transmission. How does this work?

Detecting an Eavesdropper Heisenberg’s uncertainty principle states that there are certain conjugate variables on which limits are placed on the simultaneous knowledge of both. Measuring one variable will necessarily affect the other. Polarization properties of light fall into this category, therefore, an interloper who is trying to intercept and measure the optical signal will invariably affect the system in a such a way that their interference will be noticed.

Sample Apparatus Image : Scientific American, July ) LED produces faint flashes of green light. 2) Pinhole, lens, and filter turn dim flashes into a collimated beam. 3) Light beam is polarized horizontally. 4) Pockels cells randomly select an orientation of 45,90, 135 or 180 degrees. 5) Polarized light leaves the transmitter and enters the fiber optic.

6)The polarized photons enter the reciever where another pockels cell randomly chooses to measure rectilinear or diagonal polarization 7)The Prism directs the photons to respective photo-multipliers depending on their polarization. Sample Apparatus Image : Scientific American, July 1992

The Evolution of Q.C. In 1970, Stephen J. Weisner designed a theoretical bank note that would be impossible to duplicate, using the laws of quantum mechanics. He proposed using similar principles for cryptography. In the 1980’s, Charles Bennett and Gilles Brassard used Weisner's ideas to develop the first quantum mechanics based cryptosystem. They were able to transmit, through open air, a distance of about 30 cm by In June of 2003 British Researchers led by Dr. Andrew Shields transmitted a usable key over 100 km of fiber optic cable. Nov. 3, 2003 – MagiQ systems announces general availability of world’s first commercially available quantum cryptography system, supporting key exchanges at distances up to 120 km.

Using EPR Entangled Pairs for Q.C. Uses conjugate pairs for information exchange Sender retains one particle Reciever obtains “matching” particle Anything that happens to one particle happens also to its matched particle Attempt in intercepting the sent particle results in disturbance of both the sent and retained particle Sender is alerted that the message has been compromised Inablility to store entangled pairs for more than a fraction of a second makes this theory unrealistic to implement

Weaknesses and Limitations of Q.C. Only works along unbroken and relatively short fiber optic cables. Record as of March, 2004 is 120 km. Doesn’t solve authentication problem. Doesn’t address some of the weakest links in data security such as human corruptibility and key storage. Relatively high cost.

Conclusion Quantum cryptography developments promise to address some of the problems that plague classical encryption techniques such as the key distribution problem and the predicted breakdown of the public/private key system. quantum cryptography operates on the Heisenberg uncertainty principle and random polarization of light. Another purely theoretical basis involves EPR entangled pairs. Due to the high cost of implementation and the adequacy of current cryptological methods, it is unlikely that quantum cryptography will be in widespread use for several years.

Bennett, C. H., G. Brassard and A. K. Ekert. “Quantum Cryptography”, Scientific American. October 1992: pp. 752 – 753. Brassard, Gilles. “A Bibliography of Quantum Cryptography” (April 24,2002). [Online] Available at: April 13, DeJesus, Edmund. “Cryptography : Quantum Leap”. Information Security Magazine (Aug 2001). [Online] Available at: May 8, Hammond, Andrew. MagiQ. [Online] Available at: May 11, Kahn, David. “The Codebreakers”. Macmillan, Nickels, Ian. Informal in-person interviews conducted in May 2004 at SRJC. The European Information Society Group. “Briefing 16 Annex 1 : What is Cryptography?”. [Online] Available at: April 15, Thornton, Stephen T. and Andrew Rex. “Modern Physics For Scientists and Engineers”. Second Edition. United States of America: Thomson Learning, Unsigned. “Quantum leap for secret codes” BBC News (June 5, 2003). [Online] Available at: April 13, Sources