Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
Codes, Ciphers, and Cryptography Quantum Cryptography.
Alice and Bob in the Quantum Wonderland. Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = ? x ? =
Hands-On Quantum Uncertainty. Quantum uncertainty is present in the diffraction, polarization and interference of light.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Gagan Deep Singh GTBIT (IT) August 29,2009.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Quantum Computing Presented by: Don Davis PHYS
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Hands-On Quantum Uncertainty This development of this workshop was supported by the Perimeter Institute of Theoretical Physics.
Quantum Cryptoanalysis and Quantum Cryptography (An introduction)
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Build Your Own Quantum Computer for Fun and Profit!
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Nawaf M Albadia
Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Our Proposed Technique
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Computers Superposition Interference Entanglement and Quantum Error Correction Lesson 1 By: Professor Lili Saghafi
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum Cryptography and Quantum Computing

Cryptography is about a)manipulating information b)transmitting information c)storing information

Computing is about a)manipulating information b)transmitting information c)storing information

What fundamental concepts of quantum physics were explored in the quantum video? a)measurement-disturbance and many worlds b)wave-particle duality and the pilot wave c)many worlds and the pilot wave d)measurement-disturbance and wave-particle duality

Wave-particle duality means that a quantum object can be in two places or states at one time. This is called a superposition and it is essential for quantum computing.

Measurement-disturbance is essential for quantum cryptography. Entanglement is used for both cryptography and computing.

One method of cryptography uses a long random string of digits - a key - to encrypt and then decrypt a message. The key must be random, as long as the message and it can only be used once. Quantum Cryptography

Only quantum physics can provide truly random keys.

Quantum physics can also provide a secure way to transmit these keys.

It uses entangled polarized photons. To understand polarized photons, you just need to take your understanding of polarized light and imagine what will happen if the light is so faint, there is only one photon.

A photon has passed through a vertical polarizer. It heads towards a second one. What are the chances that the photon will be able to pass through it? a) 0% if it is vertical and 100% if it is horizontal b) 100% if it is vertical and 0% if it is horizontal c) 50% if it is vertical and 50% if it is horizontal d) 100% if it is vertical and 100% if it is horizontal

A photon has passed through a vertical polarizer. It heads towards a second one. What are the chances that the photon will be able to pass through it? a) 0% if it is +45 and 100% if it is -45 b) 100% if it is +45 and 0% if it is -45 c) 50% if it is +45 and 50% if it is -45 d) 100% if it is +45 and 100% if it is +45

A photon has passed through a vertical polarizer. It then passed through one at +45. What are the chances that the photon will be able to pass a third? a) 0% if it is vertical and 100% if it is horizontal b) 100% if it is vertical and 0% if it is horizontal c) 50% if it is vertical and 50% if it is horizontal d) 100% if it is vertical and 100% if it is horizontal

Alice sends Bob a key using polarized photons. Animation of bb84

Eve tries to eavesdrop. She doesn’t know what basis to use. Suppose a vertical photon was sent and she chose diagonal polarizers. The value she got is meaningless and she will send Bob a diagonal photon, not a vertical one. If Bob uses the correct basis, he might get a horizontal photon instead of vertical and Eve’s presence will be detected.

Suppose Eve intercepted 16,000 photons. How many times will she get caught? 1) 8,000 2) 4,000 3) 2,000 4) 1,000

Quantum Computers Computers are based on quantum devices - transistors - which are getting smaller and smaller. Soon they will be so small that they will be directly subject to quantum rules. This is both a problem and an opportunity. We will be looking at the opportunity.

Quantum computation is fundamentally different from classical computation. Our present computers store information in bits, which can be either a 0 or a 1.

A quantum computer stores information in qubits. These can be both a 0 and a 1 because quantum objects can be in a superposition of two states at one time.

When the object is measured, it is disturbed, and is always found in one state or the other – 0 or 1. polarizationspinenergy level

The real power comes when you have entangled qubits. Three qubits can be in all the possible bit combinations at once; 000, 001, 010, 011, 100, 101, 110 and 111. That’s eight pieces of data - not three. When measured, you will get one of them

How many bits can you store in 20 qubits? a)1,000 b)10,000 c)100,000 d)1,000,000

What might a quantum computer do that a classical computer can’t? Simulate quantum systems Make a really fast search engine Factor really big numbers* * Which is why we need quantum cryptography!

To get a feeling for how quantum computation is fundamentally different from classical computation, we are going to look at quantum tic tac toe.

Superposition 1 1

Many games/calculations at a time

Entanglement

Measurement-Disturbance

1 2 Random Classical States

Weird Quantum Result

Weirder Quantum Result