A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Quantum Key Distribution works like an unsophisticated candy machine Scott Shepard Louisiana Tech University.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Encryption. Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Completed/planned activities of AGH in VD-A Miroslaw Kantor, Marcin Niemiec Department of Telecommunications AGH University of Science and Technology VD-A.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Presented By: Mathew Hazel John Healy & Ira Nicks.
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
CIS 325: Data Communications1 Chapter Seventeen Network Security.
CS 101 – Nov. 20 Communication, continued (Ch. 15) Cryptography –examples Error detection Local Area Networks –Different ways to hook up machines.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Signal Intelligence Fiber Optic Wire tapping By: Mark Jensen.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Quantum Key Distribution in the GÉANT network
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
COMPUTER NETWORKS and INTERNETS
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
DEPARTMENT OF COMPUTER SCIENCE
Lecture 14: Blocking and Catching Photons Background
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo

Quantum Cryptography? Uses light particles, photons through optical fiber instead of electric waves on wire A defining discovery in physics: that subatomic particles can exist in multiple states at once until something interacts with them. Eavesdropping on the photons, such as setting up a photo detector to read the code, makes the codes unusable and can be detected.

Basic Idea

Quantum Key Distribution Core aspect of quantum networking Two parties share a key obtained by QKD before data communication Separated in two channels: quantum channel and public channel Uses different polarization of a photon to encode a bit Example protocols: BB84, B92

Working Examples The Boston network(BBN – Havard – Boston university) is the first internet-integrated system. A group in Europe recently made the first quantum encrypted bank transaction. MagiQ Technologies and id Quantique are selling commercial QKD systems.

Pros & Cons Nearly Impossible to steal, even with a super- powered computer Detect if someone is listening “Secure” – randomness, no cloning Distance Limitations Availability –Expensive (MagiQ sells it at $50,000 per piece) –Vulnerable to DOS –Keys can’t keep up with data transmission

Questions?