1 / 25

QUANTAM CRYPTOGRAPHY

-SECRECY ENSURED. QUANTAM CRYPTOGRAPHY. TABLE OF CONTENT. INTRODUCTION. CLASSICAL CRYPTOGRAPHY. QUANTAM CRYPTOGRAPHY. WORKING. KEY DISTRIBUTUION. TECHNOLOGY. SECURITY. A DVANTAGES. LIMITATIONS. CONCLUSION.

elmer
Download Presentation

QUANTAM CRYPTOGRAPHY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. -SECRECY ENSURED QUANTAM CRYPTOGRAPHY

  2. TABLE OF CONTENT INTRODUCTION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING KEY DISTRIBUTUION TECHNOLOGY SECURITY ADVANTAGES LIMITATIONS CONCLUSION

  3. The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. • Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. INTRODUCTION

  4. The whole point of cryptography is to keep information out of the hands of anyone but its intended recipient. • Even if the message gets intercepted, the meaning won’t be apparent to the intercepted – unless the interceptor is able to decipher it. CRYPTOGRAPHY

  5. Principle of Cryptography.

  6. A PRACTICAL Example - • Alice wants to send a message to Bob, without an eavesdropper Eve intercepting the message.

  7. Type of cryptography CRYPTOGRAPHY Quantum Classical

  8. Encryption algorithm and related key are kept secret. • Breaking the system is hard due to large numbers of possible keys. • For example: for a key 128 bits long there are – keys to check. THE classical cryptography

  9. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. • Quantum technology promises to revolutionize secure communication at an even more fundamental level. The quantum cryptography

  10. Quantum Cryptography – ensuring the most secure transmission of the secret information – works on the principle of – “ Quantum Mechanics”. • Transmission is carried out at the bit level with the help of various types of alignment of the photons. • It also solves the problem of key distribution arising in the Classical Cryptography. The quantum cryptography

  11. working

  12. A user can suggest a key by sending a series of photons with random polarizations. This sequence can then be used to generate a sequence of numbers. The process is known as quantum key distribution. Main Features: • Key distribution distance: up to 60 km • Key distribution rate: up to 1000 bits/s Quantum key distribution

  13. Photon Source. • Photon Detector. • Communication channel. Quantum cryptography technology

  14. Photon Gun. • Light - emitting p-n junction. • Single ion. Photon source

  15. Avalanche photodiodes. • Germanium detectors. • Silicon. • Photo multiplier. Photon detector

  16. Fiber optical communication link. • Free – space laser communication. Communication channel

  17. Quantum cryptography obtains its fundamental security from the fact that each qubit of information is carried by a single photon, and that each photon will be altered as soon as it is read once. • This makes impossible to intercept message without being detected. Security of qkd

  18. The presence of noise can impact detecting attacks. • Eavesdropper and noise on the quantum channel are indistinguishable. • Detecting eavesdropper in the presence of noise is hard. Effect of noise

  19. E-mail messages. • Telephone calls. • Financial Transactions. application

  20. The most important contribution of quantum cryptography is a mechanism for detecting eavesdropping.  • Quantum key distribution enables “encrypted communications on demand,” because it allows key generation at transmission time over an unsecured optical communications link. advantages

  21. We have to use pure fiber optic end-to-end network and boosters are needed at some distance, so it is expensive. • It will also be critical to authenticate the identity of the recipients. • It is also not clear how to modify the scheme in order to deal with noisy quantum transmissions. • It is hard to transmit a photon, entangled over great distances. Photon detectors aren't particularly reliable. limitations

  22. Currently it works only over short distances, but there are situations in which even short-distance transmission is useful. Also, with sufficient technical improvements, it might be possible in the future to implement quantum cryptography over long distances. • The devices for implementing such methods exist and the performance of demonstration systems is being continuously improved. Within the next few years, such systems could start encrypting some of the most valuable secrets of government and industry. conclusion

  23. THANK-YOU CREDITS NISARG TRIVEDI

More Related