Download presentation
Presentation is loading. Please wait.
Published byKari Mäkinen Modified over 6 years ago
1
Group 7 Justin Jones Ashley Robinett Jonathan Bull
Quantum Cryptography Group 7 Justin Jones Ashley Robinett Jonathan Bull
2
Quantum Cryptography Key Words Classical Cryptography
Quantum Physics Photons Eavesdropping Heisenberg’s Uncertainty Principle
3
Quantum Cryptography Classical Cryptography- uses mathematical techniques to restrict eavesdroppers Quantum Cryptography- uses quantum physics to restrict eavesdroppers Quantum Physics- the branch of physics that deals with atomic and subatomic particles and the energy of atoms
4
Quantum Cryptography Photon- one of the elementary particles whose interactions with electrons and atomic nuclei account for the features of matter Eavesdropping- the intercepting of conversations by unintended recipients Heisenberg’s Uncertainty Principle- tells us that merely observing a quantum object alters it
5
Quantum Cryptography What It Is
Developed by Stephen Weisner in the early 1970’s In 1991, the first prototype was made operable only over a distance of 32 centimeters (February 2006) Hoi-Kwong Lo’s study describes the first experimental proof of a quantum decoy technique to encrypt data over a fiber optic cable
6
Quantum Cryptography Varies the intensity of photons and introduces “photonic decoys” Photons carry complex encryption keys through fiber optic cables Afterwards, a second broadcast tells the receiving computer which photons carried the signal and which ones were decoys
7
Quantum Cryptography If a hacker tries to eavesdrop on the data stream to try and figure out the encryption key, the mere act of eavesdropping changes the decoys- which tells the computer that the data has been tampered with
8
Quantum Cryptography Benefits
Allows the transmission of sensitive information (banking records, personal info, etc.) Allows more security for online banking Can be implemented now because the experiment was done with a commercial device
9
Quantum Cryptography Benefits
Increases the distance that information can sent up to 100 km Confuses hackers and eavesdroppers Merely looking electronically at the photon keys will automatically change their shape and render them useless in unlocking the information Both sender and receiver can know if someone is eavesdropping or not
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.