Sunteți pe pagina 1din 21

QUANTUM CRYPTOGRAPHY.

Sanjula Jaiswal CSE 3rd Year Roll No:27

Cryptography

What is Cryptography?
Cryptography is a way of disguising information so that it can be transmitted while entirely restricting the contents to its intended recipient(s), even if the transmission is received by others.

Some Major Applications


To protect privacy, confidentiality. Insuring data integrity - detecting and preventing unauthorized data manipulation. Authentication - the means by which two parties can positively identify each other.

A Brief Lesson in Cryptography


Vocabulary: Plaintext the original message. Cipher text the disguised message. Key A set of parameters supplied to encryption and decryption algorithms. Encryption using a key to change plaintext into cipher text. Decryption using a key to change cipher text back into something readable.

Quantum Cryptography

Why Quantum Cryptography?


Quantum computing and mathematical advances may soon render current cipher algorithms obsolete. Classical cryptography techniques allow the key transmission to be passively monitored without alerting the legitimate user users. Luckily, quantum cryptography addresses both of these issues!

Elements of the Quantum Theory


Light waves are propagated as discrete quanta called photons. They are massless and have energy, momentum and angular momentum called spin. Spin carries the polarization. If on its way we put a polarization filter a photon may pass through it or may not. We can use a detector to check of a photon has passed through a filter.

Photon polarization

Heisenberg Uncertainty Principle


Certain pairs of physical properties are related in such a way that measuring one property prevents the observer from knowing the value of the other.

If a photon passes through a vertical filter it will have the vertical orientation regardless of its initial direction of polarization

Photon Polarization

Binary information
Each photon carries one qubit of information Polarization can be used to represent a 0 or 1. In quantum computation this is called qubit. To determine photons polarization the recipient must measure the polarization by ,for example, passing it through a filter.

How Does Quantum Mechanics Works?

Quantum key distribution


Both Alice and Bob have two polarizers each. One with the 0-90 degree basis (+) and one with 45-135 degree basis ( ) (a) Alice uses her polarizers to send randomly photons to Bob in one of the four possible polarizations 0,45,90,135 degree. (b) Bob uses his polarizers to measure each polarization of photons he receives. He can use the( + )basis or the ( ) but not both simultaneously.

Example of key distribution

Quantum Mechanics hides the secret code key


To begin creating a key Alice sends photon through either 0 or 1 slot of the rectilinear or diagonal polarization filter, while making record of various orientation. For each incoming bit, Bob choses to randomly which filter slot he uses for detection and writes down both the polarization and the bit value. If Eves the eavesdropper tries to spy on train of photons, quantum mechanics would prohibit her from using the both the filters to detect the orientation of a photon. If she choses the wrong filters, She may create an error by modifying their polarization.

Quantum Mechanics hides the secret code key


After all the photon have reached Bob, he tell Alice over a public channel perhaps by telephone or an email, the sequence of filter he used for the incoming photons, but not the bit value of photon. Alice tells Bob during the same conversation which filter he chose correctly. Those instances constitutes the bits that Alice and Bob will use to form the key that they will use to encrypt the message.

Quantum key distribution


(a)Alice communicates with Bob via a quantum channel sending him photons. (b) Then they discuss results using a public channel. (c) After getting an encryption key Bob can encrypt his messages and send them by any public channel.

Security of quantum key distribution


Quantum cryptography obtains its fundamental security from the fact that each qubit is carried by a single photon, and each photon will be altered as soon as it is read. This makes impossible to intercept message without being detected.

Advantage
Nearly Impossible to steal Detect if someone is listening
Measurements are changed Signal strength is reduced

Secure

Thanks

S-ar putea să vă placă și