By Nicholas Moradi CST 300L Fall 2012. In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Internet and Modern Life
GCSE ICT Networks & Security..
Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
CS4600/5600 Biometrics and Cryptography UTC/CSE
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
Gagan Deep Singh GTBIT (IT) August 29,2009.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
ITGS Types of network.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography and Network Security (CS435) Part One (Introduction)
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
INTERNET. Objectives Explain the origin of the Internet and describe how the Internet works. Explain the difference between the World Wide Web and the.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Nawaf M Albadia
Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Quantum cryptography How could you transmit information safety? Thanks to codes.
Digital Signatures and Digital Certificates Monil Adhikari.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
21 st november  Iphone – texting-internet-apps- when texting it sends wirelessly to the reciver  Laptop-downloading-internet- it travels using.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Ethernet, WiFi & Protocols
Key management issues in PGP
Web Applications Security Cryptography 1
Go to youtube and search “Code.org internet videos”
J. Miranda University of Ottawa 21 November 2003
Protocols.
Cryptography & Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Pooja programmer,cse department
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Protocol Application TCP/IP Layer Model
Presentation transcript:

By Nicholas Moradi CST 300L Fall 2012

In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to view to everyone but the two connecting to each other. They wanted to make it so “it required the legitimate parties to share a secret key” (Brassard, 2005). They wanted to make it so that no eavesdropper could read into it because the eavesdropper could intercept it and read it if it were crack-able. In 1983 the researchers developing this technology “realized how much easier it would be to use the quantum channel to transmit an arbitrarily long random secret key” (Brassard, 2005). This would require both users receiving the message to have quantum computers too. This way if an intruder tried to get into the channel the key would be thrown away and the message lost forever HISTORY

Also in 1983 the Quantum Key Distribution was created to send out public keys when a user downloads a file. In the 1990’s the Quantum Key Distribution was reinvented, it used entanglement which further increased the security of devices and machinery. HISTORY CONT… Gilles Brassard A video of him explaining Quantum Cryptography:

HOW IT WORKS This picture explains how quantum cryptography works. Step one: User A sends a photon through the slot 0 or 1, while recording the different movements of it. Step two: User B randomly filters the slot used for detection and recors both bit value and polarization. Step 3: If an eavesdropper User C tries reading the data, quantum mechanics prohibit her from accessing both channels Step 4: User B then sends User A the information of the sequence of filters that User B recorded Step 5: User B sends the bits recorded to User A. After the bits match up User A sends the data.

With quantum cryptography it does “not only allows for the creation of an unbreakable cryptosystem, it also reduces the possible harm that could result from a "man in the middle" attack” (Smith, 2004). After the intended public key is given out I can’t be used again by the same user for the same file. Quantum Cryptography allows “the use of one time pads allows for completely unbreakable encryption (provided that, as the name implies, they are used only once!). The use of quantum cryptography allows for a limited but unbreakable means of distributing these one time pads. Despite its limitations, quantum cryptography may be the only completely secure encryption system that the world will ever know” (Smith, 2004). HOW IT WORKS CONT.

SECURITY Whatever worries there are for people who use the internet fear not “quantum cryptography addresses the most worrisome aspect of current public key cryptography, which powers Web browsers, applications like Pretty Good Privacy (PGP), and workhorse protocols like SSH and SSL”(McCullagh, 2003). It creates keys to large and to hard for a human to compute. Connection with quantum cryptography are usually always point to point and if connections are intercepted “the intended recipients will see an increase in the error rate of the data received, allowing them to detect if it has been accessed” (Ferguson, 2008). So in conclusion if someone tries to tamper with the information the data is wiped.

BRINGING THE QUANTUM HOME With our advances on this unbreakable technology, it comes to the front doors of commercial use. Quantum cryptography “has until now needed a dedicated fibre separate from that used to carry data”(Palmer, 2012). Until now “the requirement of separate fibers has greatly restricted the applications of quantum cryptography in the past, as unused fibers are not always available for sending the single photons, and even when they are, can be prohibitively expensive” (Wickham, 2012). This means that these technologically advanced data protocols can now be accessed over broadband cables.

With technological advances quantum computing was brought to the homestead. Researchers at the Max Planck Institute of Quantum Optics in Germany “claimed the first elemental quantum network where information was stored in the quantum state of a single atom using an approach which could be done at larger scale. The atom emits a photon, which encodes the atom's state in its polarity. The photons were then transferred to another network node at another laboratory connected by an optical fiber to send information” (LaMonica, 2012). This means that the cables containing quantum coding can be transferred using normal fibre cables, which in turn means that users someday will be able to use this technology at home! BROADBAND CABLES

Using a connection a detector is set up to detect if a photon arrives up to the micro- second. This photon holds the quantum key. The photon travels through the connection with “the ultra-high shutter-speed snapshot detector responds largely to just the single photon signals and is insensitive to the scattered light caused by the other data signals. This allows the weak single photon signals to be recovered from the fibre” (Leyden, 2012). This means through the broadband cable the photon is subject to different orientations that allow the light from shutters to determine the data. HOW IT WORKS

References Brassard, G. (2006, April 11). Brief History of Quantum Cryptography: A Personal Perspective. Quantum Physics. Retrieved December 11, 2012, from arxiv.org/abs/quant-ph/ v1 Ferguson, T. (2008, October 8). Network security makes a quantum leap | Security & Privacy - CNET News. Technology News - CNET News. Retrieved December 11, 2012, from LaMonica, M. (2012, April 12). Physicists connect the dots on quantum computing | Cutting Edge - CNET News. Technology News - CNET News. Retrieved December 11, 2012, from computing/ Leyden, J. (2012, November 20). Quantum crypto - with nothing more than STANDARD broadband fibre • The Register. The Register: Sci/Tech News for the World. Retrieved December 11, 2012, from Markoff, J. (2012, November 20). Scientists Find Cheaper Way to Ensure Internet Security. New York Times. Retrieved December 11, 2012, from McCullagh, D. (2003, November 6). Start-up makes quantum leap into cryptography - CNET News. Technology News - CNET News. Retrieved December 11, 2012, from Palmer, J. (2012, November 21). Quantum cryptography done on standard broadband fibre. BBC News, p. 1. Retrieved December 11, 2012, from Smith, T. (2004, May 14). Quantum Cryptography. UCSD - Department of Mathematics. Retrieved December 12, 2012, from Wickham, C. (2012, November 19). Unhackable telecom networks come a step closer. Chicago Tribune, p. 1. Retrieved December 11, 2012, from articles.chicagotribune.com/ /business/sns-rt-us-science-networks-hackingbre8aj00a _1_optical-fiber-quantum- cryptography-photons Woodward, A. (2012, November 20). Quantum Cryptography at the End of Your Road | Guest Blog, Scientific American Blog Network. Scientific American Blog Network. Retrieved December 11, 2012, from blog/2012/11/20/quantum-cryptography-at-the-end-of-your-road/ REFERENCES