html5-img
1 / 10

Quantum Cryptography

Quantum Cryptography. By: Lacey De Bois, Luis Molina, Vanessa Nielsen.

sienna
Download Presentation

Quantum Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum Cryptography By: Lacey De Bois, Luis Molina, Vanessa Nielsen

  2. *Before we discuss Quantum Cryptography we must first understand Cryptography.  Cryptography is a Greek word meaning hidden secret.  The basic definition is the art of writing or solving codes.*Quantum Cryptography is used in practical applications like: ATM cards, computer passwords, and electronic commerce.  It is a secure way to communicate.  Quantum cryptography uses physics instead of mathematics to encode messages, which provides greater security*How it works is: polarized photons (1 or 0) are sent and on the other end the photon is received and the polarization is determined.  The polarization then is a line of code being ones and zeros.  *Each photon is a “qubit” ~ one bit of information.*One benefit of using Quantum Cryptography is when the polarization is disturbed; it is very obvious that the line of code has been tampered with.*One down side to using Quantum Cryptography is that after the polarization has been tampered with it is impossible to recover.  What is Quantum Cryptograph?

  3. How does Quantum Cryptography work? Quantum cryptography uses the polarization of photons to send the secret messages. The system prevents secrecy because anyone who intercepts the photon will disrupt the polarization. The system ensures secrecy because anyone intercepting a transmitted photon will disrupt its polarization, and affect the rate at which the receiver can correctly measure it. So the sender and receiver can detect the eavesdropper by noticing a spike in the transmission error rate. They can then stop communicating or try again on a different network

  4. How Quantum Cryptography works in Theory The process is usually explained with two people, Alice and Bob, who want to send each other secure messages. Alice sends Bob a key, a random sequence of bits that represent either 1 or 0. The key is a stream of bits that are traveling linearly and oscillating. The angle of the oscillations is the polarization of the particles. Alice will send Bob bits using one of two polarizers in a random order. Bob must guess which of the two polarizers to use when receiving Alice's bits. If he uses the correct one, he will receive the correct bit number. If Bob chooses the wrong polarizer, then a random number will appear (1 or 0). Bob will record his data and send it back to Alice so she can compare results. Alice will then send Bob a message letting him know which bits were guessed correctly. They will both remove the incorrect bits, giving them a network key that is unique to them.

  5. Ideally, Bob will have a 75% success rate. 50% of the time he will choose the correct polarizer, but when he chooses the wrong polarizer he has a 50% chance of getting the correct number out of the wrong polarizer. This puts Bob at 50% and 25% success, or 75%. If their nemesis, Eve, is intercepting their information then Bob will have a lower success rate. Eve will check 50% with the correct polarizer and 50% with the incorrect polarizer. Bob will receive 50% of the bits in their original format, and 50% will be random bits. Bob will still have a 75% success rate with the Eve's correct bits and a 50% success rate with her random bits he received. This gives Bob 37.5% and 25%, or a total of 62.5% success because Bob has a success rate is less than 100% after they got rid of the bits that didn’t work initially they know Eve was spying.

  6. Video • http://youtu.be/3DGlEvC78iE

  7. Research References http://www.csa.com/discoveryguides/crypt/overview.php http://en.wikipedia.org/wiki/Cryptography http://en.wikipedia.org/wiki/Quantum_cryptography http://www.thenewnewinternet.com/2010/08/04/researchers-claim-unbreakable-cryptography/ http://www.hitachi.com/rd/yrl/people/info_security/04.html http://www.nature.com/news/2010/100520/full/news.2010.256.html

More Related