Top Banner

of 25

Ppt Quantum Cryptography

Apr 07, 2018

Download

Documents

Amit
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/6/2019 Ppt Quantum Cryptography

    1/25

    QUANTAMCRYPTOGRAPHY

    -SECRECY ENSURED

  • 8/6/2019 Ppt Quantum Cryptography

    2/25

    TABLE OF CONTENT

    TECHNOLOGYKEY DISTRIBUTUION

    CLASSICAL

    CRYPTOGRAPHY

    QUANTAM

    CRYPTOGRAPHY

    WORKING

    INTRODUCTION

    SECURITY

    CONCLUSION

    ADVANTAGES LIMITATIONS

  • 8/6/2019 Ppt Quantum Cryptography

    3/25

    INTRODUCTION

    The recent application of theprinciples of quantum mechanics tocryptography has led to aremarkable new dimension in secretcommunication.

    Quantum cryptography is an effortto allow two users of a common

    communication channel to create abody of shared and secretinformation.

  • 8/6/2019 Ppt Quantum Cryptography

    4/25

    CRYPTOGRAPHY

    The whole point of cryptography is

    to keep information out of the hands

    of anyone but its intended recipient.

    Even if the message gets intercepted,

    the meaning wont be apparent to the

    intercepted unless the interceptoris able to decipher it.

  • 8/6/2019 Ppt Quantum Cryptography

    5/25

    Principle of Cryptography.

  • 8/6/2019 Ppt Quantum Cryptography

    6/25

    A PRACTICAL EXAMPLE -

    Alice wants to send a message to

    Bob, without an eavesdropper Eve

    intercepting the message.

  • 8/6/2019 Ppt Quantum Cryptography

    7/25

    TYPE OF CRYPTOGRAPHY

    CRYPTOGRAPHY

    Classical Quantum

  • 8/6/2019 Ppt Quantum Cryptography

    8/25

    THE CLASSICAL CRYPTOGRAPHY

    Encryption algorithm and related

    key are kept secret.

    Breaking the system is hard due to

    large numbers of possible keys.

    For example: for a key 128 bits

    longthere are keys to

    check.

    38128102 }

  • 8/6/2019 Ppt Quantum Cryptography

    9/25

    THE QUANTUM CRYPTOGRAPHY

    An important and unique property of

    quantum cryptography is the ability

    of the two communicating users to

    detect the presence of any thirdparty trying to gain knowledge of

    the key.

    Quantum technology promises torevolutionize secure communication

    at an even more fundamental level.

  • 8/6/2019 Ppt Quantum Cryptography

    10/25

    THE QUANTUM CRYPTOGRAPHY

    Quantum Cryptography ensuring themost secure transmission of the secretinformation works on the principle of Quantum Mechanics.

    Transmission is carried out at the bitlevel with the help of various types ofalignment of the photons.

    It also solves the problem of keydistribution arising in the ClassicalCryptography.

  • 8/6/2019 Ppt Quantum Cryptography

    11/25

    WORKING

  • 8/6/2019 Ppt Quantum Cryptography

    12/25

  • 8/6/2019 Ppt Quantum Cryptography

    13/25

  • 8/6/2019 Ppt Quantum Cryptography

    14/25

    QUANTUM KEY DISTRIBUTION

    Auser can suggest a key by sendinga series of photons with randompolarizations. This sequence canthen be used to generate a sequence

    of numbers. The process is known asquantum key distribution.

    Main Features: Key distribution distance: up to 60

    km

    Key distribution rate: up to 1000

    bits/s

  • 8/6/2019 Ppt Quantum Cryptography

    15/25

    QUANTUM CRYPTOGRAPHY TECHNOLOGY

    Photon Source.

    Photon Detector.

    Communication channel.

  • 8/6/2019 Ppt Quantum Cryptography

    16/25

    PHOTON SOURCE

    Photon Gun.

    Light - emitting p-n junction.

    Single ion.

  • 8/6/2019 Ppt Quantum Cryptography

    17/25

    PHOTON DETECTOR

    Avalanche photodiodes.

    Germanium detectors.

    Silicon.

    Photo multiplier.

  • 8/6/2019 Ppt Quantum Cryptography

    18/25

    COMMUNICATION CHANNEL

    Fiber optical communication link.

    Free space laser communication.

  • 8/6/2019 Ppt Quantum Cryptography

    19/25

    SECURITY OF QKD

    Quantum cryptography obtains its

    fundamental security from the fact

    that each qubit of information is

    carried by a single photon, and thateach photon will be altered as soon

    as it is read once.

    This makes impossible to intercept

    message without being detected.

  • 8/6/2019 Ppt Quantum Cryptography

    20/25

    EFFECT OF NOISE

    The presence of noise can impact

    detecting attacks.

    Eavesdropper and noise on the

    quantum channel are

    indistinguishable.

    Detecting eavesdropper in the

    presence of noise is hard.

  • 8/6/2019 Ppt Quantum Cryptography

    21/25

    APPLICATION

    E-mail messages.

    Telephone calls. Financial Transactions.

  • 8/6/2019 Ppt Quantum Cryptography

    22/25

    ADVANTAGES

    The most important contribution of

    quantum cryptography is a mechanism

    for detecting eavesdropping.

    Quantum key distribution enables

    encrypted communications on demand,

    because it allows key generation at

    transmission time over an unsecured

    optical communications link.

  • 8/6/2019 Ppt Quantum Cryptography

    23/25

    LIMITATIONS

    We have to use pure fiber optic end-to-

    end network and boosters are needed at

    some distance, so it is expensive.

    It will also be critical to authenticate

    the identity of the recipients.

    It is also not clear how to modify the

    scheme in order to deal with noisy

    quantum transmissions.

    It is hard to transmit a photon, entangled

    over great distances. Photon detectors

    aren't particularly reliable.

  • 8/6/2019 Ppt Quantum Cryptography

    24/25

    CONCLUSION

    Currently it works only over shortdistances, but there are situations in

    which even short-distance transmission is

    useful.Also, with sufficient technical

    improvements, it might be possible in the

    future to implement quantumcryptography over long distances.

    The devices for implementing such

    methods exist and the performance of

    demonstration systems is beingcontinuously improved. Within the next

    few years, such systems could startencrypting some of the most valuable

    secrets of government and industry.

  • 8/6/2019 Ppt Quantum Cryptography

    25/25