1 / 9

Quantum Cryptography

Quantum Cryptography. Group 7 Justin Jones Ashley Robinett Jonathan Bull. Quantum Cryptography. Key Words Classical Cryptography Quantum Cryptography Quantum Physics Photons Eavesdropping Heisenberg’s Uncertainty Principle. Quantum Cryptography.

guffeyj
Download Presentation

Quantum Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum Cryptography Group 7 Justin Jones Ashley Robinett Jonathan Bull

  2. Quantum Cryptography • Key Words • Classical Cryptography • Quantum Cryptography • Quantum Physics • Photons • Eavesdropping • Heisenberg’s Uncertainty Principle

  3. Quantum Cryptography • Classical Cryptography- uses mathematical techniques to restrict eavesdroppers • Quantum Cryptography- uses quantum physics to restrict eavesdroppers • Quantum Physics- the branch of physics that deals with atomic and subatomic particles and the energy of atoms

  4. Quantum Cryptography • Photon- one of the elementary particles whose interactions with electrons and atomic nuclei account for the features of matter • Eavesdropping- the intercepting of conversations by unintended recipients • Heisenberg’s Uncertainty Principle- tells us that merely observing a quantum object alters it

  5. Quantum Cryptography • What It Is • Developed by Stephen Weisner in the early 1970’s • In 1991, the first prototype was made operable only over a distance of 32 centimeters • (February 2006) Hoi-Kwong Lo’s study describes the first experimental proof of a quantum decoy technique to encrypt data over a fiber optic cable

  6. Quantum Cryptography • Varies the intensity of photons and introduces “photonic decoys” • Photons carry complex encryption keys through fiber optic cables • Afterwards, a second broadcast tells the receiving computer which photons carried the signal and which ones were decoys

  7. Quantum Cryptography • If a hacker tries to eavesdrop on the data stream to try and figure out the encryption key, the mere act of eavesdropping changes the decoys- which tells the computer that the data has been tampered with

  8. Quantum Cryptography • Benefits • Allows the transmission of sensitive information (banking records, personal info, etc.) • Allows more security for online banking • Can be implemented now because the experiment was done with a commercial device

  9. Quantum Cryptography • Benefits • Increases the distance that information can sent up to 100 km • Confuses hackers and eavesdroppers • Merely looking electronically at the photon keys will automatically change their shape and render them useless in unlocking the information • Both sender and receiver can know if someone is eavesdropping or not

More Related