Top Banner
QUANTUM CRYPTOGRAPHY & QUANTUM KEY DISTRIBUTION
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Quantum Cryptography

QUANTUM CRYPTOGRAPHY

&QUANTUM KEY DISTRIBUTION

Page 2: Quantum Cryptography

What Is Cryptography

Secret message

Page 3: Quantum Cryptography

Importance & Applications

Page 4: Quantum Cryptography

Bob Alice

Eavesdropper

Some keywords

Page 5: Quantum Cryptography

Encryption

Decryption

Encryption Key

Decryption Key

Page 6: Quantum Cryptography

Plaintext

Page 7: Quantum Cryptography

Parts, Embodied In Cryptography

Page 8: Quantum Cryptography

To setup a useful cryptography system, the most important issues you would encounter is the security.

Troubles With Cryptography

Breaking The LOCK

Stealing the information within Key’s exchanging

Page 9: Quantum Cryptography

Quantum Mechanic Parameters

SU

P

E

R

P

OS

I

T

I

O

N Probabilistic

Page 10: Quantum Cryptography

PO

L

A

R

IZ

A

T

I

O

N

POLARIZATION

Page 11: Quantum Cryptography

A simple example of superposition

α

In Classic in the simplest state

0 1

up down

openclose OR

OR

OR

0 , open

1 , close

Page 12: Quantum Cryptography

So what is the difference between the classical superposition and quantum superposition

αAfter

measurement OR

With probability of

With probability of

Page 13: Quantum Cryptography

Classical CryptographyVs.

Quantum Cryptography

DONE.

Page 14: Quantum Cryptography

Classical CryptographyVs.

Quantum CryptographyS

U

P

E

R

P

OS

I

T

I

O

NS

U

P

E

R

POS

I

T

I

O

N

S UP

E

R

POS

I

T

I

ON

S UP

E

R

POS

I

T

I

ON

S UPER

POS

ITIO

N

S UPER

POSITIO

N

SU

P

E

R

P

OS

I

T

I

O

N

I’m Confused

Page 15: Quantum Cryptography

A Simple Quantum Key DistributionProtocol

Charles H.BennetGilles Brassard

1984

BB84

Quantum Cryptography: Public Key Distribution and Coin TossingPublished in physical review

Page 16: Quantum Cryptography

A Byte of message

11001110

KEY Cipher text

A SIMPLE SAMPLE OF KEY AND ITS FUNCTION

Summation rule1+1=01+0=10+0=00+1=1

Page 17: Quantum Cryptography

Quantum bit

α

Polarization of a single photon

Transmition probability

Absorptionprobability

Filter apparatus

|0>

|1>

Page 18: Quantum Cryptography

R ≡ Rectilinear Base

D ≡Diagonal Base

R

R

D D

|1>

|0>

|-> |+>

Page 19: Quantum Cryptography

Translating Quantum Bits Into Classic Bits

0

1

Polarization BasesAnd Quantum Bits

Classical Bits

0

1|0>

|+>|->

|1>

Page 20: Quantum Cryptography

R |0> 0

R |1> 1

D |+> 0

D |-> 1

Page 21: Quantum Cryptography

Bob chooses a random bit string and a random

sequence of polarization bases

(mix of Rectilinear and Diagonal)

Alice receives the photons and decides randomly for

each photon, independently of Bob, whether to measure the polarization of photon in Rectilinear or Diagonal bases

Page 22: Quantum Cryptography

0

1

If absorbed 1If transmitted 0

If absorbed 0If transmitted 1

Will absorbed 0If absorbed

If transmitted

0

1

Will transmitted

1If absorbed

If transmitted

0

1

Page 23: Quantum Cryptography

Quantum transmission 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Bob's random bit 0 1 1 0 1 1 0 0 1 0 1 1 0 0 1

Bob's random bases D R D R R R R R D D R D D D R

Bob's Polarization

Alice random bases R D D R R D D R D R D D D D R

Received bits by Alice 1 1 1 0 0 0 1 1 1 0 1

Public Discussion

Alice reports bases of received bases R D R D D R R D D D R

Bob says which bases were correct OK OK OK OK OK OK

Presumably shared information 1 1 0 1 0 1

Alice reveals some key bits at random 1 0

Bob confirms them OK OK

Outcome

Remaining shared information 1 0 1 1

Page 24: Quantum Cryptography

This information are secure with extremely high probability

So this information are suitable for KEY ; As the result the

KEY has Shared securely

Remaining shared information 1 0 1 1

1 0 1 1

OUTCOME

Page 25: Quantum Cryptography

Conclusion

The protocol is high secure and prevents Information from being Stolen and Hacked by EAVESDROPPER.

Although this protocol is theoretical, it’s not such out of reach to remain in just theories.

Although this protocol is secure enough but cannot prevent from being suppressed and excessively perturbed by EAVESDROPPER or INTRUDER.

Page 26: Quantum Cryptography