Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

22C:19 Discrete Structures Integers and Modular Arithmetic
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
Data Encryption Standard (DES)
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Public Key Model 8. Cryptography part 2.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Dr. Khalid A. Kaabneh Amman Arab University
MATH 224 – Discrete Mathematics
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
DNA Computing BY DIVYA TADESERA. Contents  Introduction  History and its origin  Relevancy of DNA computing in 1. Hamilton path problem(NP problem)
Cryptography, Authentication and Digital Signatures
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Computing Basic Concepts and Applications.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
BZUPAGES.COM Cryptography Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Private key
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Encryption
Cryptography.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Computer Security Chapter Two
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Quantum Cryptography

Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical operations to hide message content.  Decryption – Reverse of encryption to get original message  Plain Text – A clear unencrypted message.  Cipher – An Algorithm to encrypt plain text and convert it into seemingly nonsensical cipher text.  Cipher Text – The finally encrypted text

Some Well known Methods  Public Key and Private Key Systems – Uses a Public Key to encrypt and Private key is used to decrypt message.  One Time Pad(OTP) – The OTP is the random key, same length as message, applied once and only once. Theoretically IMPOSSIBLE to decipher the message without the key.  Some Other methods are RSA, DES, Double DES, Triple DES, Digital Signatures etc.

Quantum Computing  Superfast Computing. Based on the principles of Quantum Theory.  Photons will be the data carriers.  Building Blocks are “QUBITS”. A QUBIT can be 0 or 1 at the same time.  Operations are performed on QUBITS and their properties.  Can factorize 250 digit number in finite time.  Finding Key of is just a matter of time.  Present encryption techniques will become useless.

Important facts  The properties of photons are tied together so tightly that measuring one property will cause change in other thus disturbing the whole system  In Quantum World A particle can be in any state until it is observed. Once observed It gets settled in that state.  The concept of uncertainty states that One cannot have the knowledge about two properties of a photon at the same time. For example Heisenberg uncertainty principle.

 The concept of Quantum Entanglement states that photons are so closely related that it is impossible to describe One without another.  An attempt to measure the property of one photon will immediately Affect the other Photon.  It is like One Photon talking to Another photon in no time.

Quantum Cryptography The property of photons used in Quantum Cryptography is “Polarization”. Light Waves moves in every plane. Polarization is the act of selecting light waves of a particular plane. In Linear polarization Light can be polarized either horizontally or vertically. In circular polarization light waves are made to move in circular fashion.

Linear and circular polarization are bound with uncertainty. Measurement of linear polarization will destroy measurement of circular polarization. 1. Light travels in all planes. 2. Horizontal Polarisation—isolating light that travels horizontally 3. Vertical Polarisation 4. Circular polarisation

Artur Ekert’s Card Trick Given by Artur Ekert in 1991 to explain quantum cryptography. There is a whole bunch of sealed envelops with red and blue cards, marked with 0 and 1, in them. two machines to read the cards. Red and blue machine. Red machine understands red card and blue machine understands blue card. Red card with 1,in red machine will output 1. Similarly for Blue cards with blue machine. If Red card with 0 is inserted in blue machine, it will throw a random guess of 0 or 1.

Let us say there are two people Alice and Bob who want s to share the secret key safely. We hand over one sealed envelop to each. They will get the same results if they use the same color machine. This happens due to the concept of quantum entanglement. When Alice‘s blue machine says the card is blue and 1 written on it, then both the cards are blue. And so blue machine of Bob will process the card as blue and yield the same result. For sharing key they only tell each other what machine they used for every card and not the card.

Due to Quantum Entanglement they will get same result every time they use same machine. To verify they will tally some of the values. The tally values and different machine values are discarded. The remaining left is the KEY. The measurements that Alice (top row) and Bob (bottom row) make. They get the same result when they make the same measurement.

Now that they’ve made their measurements, they only keep the results where they both used the same machine They pick random results and compare them to see if there were errors

Finally, the Key!

Final Words The Concept of quantum cryptography has been around since the 1970’s. Working models have been set up in educational institutes. Can be implemented on fiber optics Network, which is not very common. Infrastructure for quantum cryptography system is Expensive. New York’s MagiQ Geneva’s idQuantique Companies like New York’s MagiQ and Geneva’s idQuantique are already providing quantum cryptography solutions to bank’s and military.

ThankYou