Anda di halaman 1dari 17

SAVITA RANA 5508426 I.

T 6th SEM

INTRODUCTION
Cryptography is the science of keeping private information from unauthorized access, of ensuring data integrity and authentication, and other tasks.

The process
Sender
Encryption Cryptotext Decryption
Secure transmission

Plaintext

Key

Recipient

Plaintext
Key ready for use

Message encryption Secure key distribution


Hard Problem for conventional encryption

CLASSICAL CRYPTOGRAPHY
Encryption algorithm and related keys are kept secret.
Breaking the system is hard due to large numbers of possible

keys. The fundamental difficulty is key distribution to parties who want to exchange messages.

MODERN CRYPTOGRAPHY
Public Key Cryptography(PKC) is the modern cryptography.
In 1970s PKC emerged. Each user has two mutually inverse keys, Encryption key is published. Decryption key is kept secret.

Anybody can send message to Bob but Bob can only read.

Quantum Cryptography
Better named Quantum key distribution.
Two physically separated parties can create and share

random secret keys. Allows them to verify that key has not been intercepted

Basic Idea

History of QKD
Stephen Wiesner in early 1970s wrote paper conjugate

coding Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for QKD protocol BB84. The prototype developed in 1991. Another QKD protocol was developed by Artur Ekert in 1991.

Heisenberg Uncertainty Principle


Certain pairs of physical properties are related to each

other in such a way that measuring one property prevents the observer from knowing the value of the other. When measuring the polarization of photon,the choice of what direction to measure effects all subsequent measurements.

Photon Polarization

Vertical filter

Tilted filter at the angle

filter depends on the angle = 90 degrees.

The probability of a photon appearing after the second and becomes 0 at

The first filter randomizes the measurements of the second filter.

Binary information
Each photon carries one qubit of information.
Polarization can be used to represent a 0 or 1. In quantum computation this is called qubit.

Contribution of Quantum cryptography


Main contribution are: It solved the key distribution problem. Unconditionally secure key distribution method was proposed by the Charles Bennett and Gilles Brassard in 1984. The method is called BB84. Once key is securely received it can be used to encrypt the messages transmitted by conventional channels.

Quantum Key Distribution


Alice communicates with Bob via a communication

channel sending him a photons. Then they discuss results using public channel. After getting an encryption key Bob can encrypt his messages and send them by any public channel.

APPLICATION OF QUANTUM CRYPTOGRAPHY


Quantum cryptography systems are used by some government agencies, large banks, telecommunications companies and other corporations who handle sensitive or military data.

Commercial Quantum Cryptography Provider


Id Quantique, Geneva Switzerland Optical fiber based system

Tens of kilometers distances.


MagiQ Technologies, NY City

Optical fiber glass Up to 100 kilometer distances

NEC Tokyo, 150 kilometers QinetiQ Famborough, England

Through the air 10 kilometers Supplied system to BBN in Cambridge Mass.

Thank you

Anda mungkin juga menyukai