Top Banner
Quantum Quantum Cryptography Cryptography
16

Quantum Cryptography. Cryptography Art of writing messages so that no one other than intended receiver can read it. Encryption – Performing mathematical.

Jan 01, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Quantum Quantum CryptographyCryptography

Page 2: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

CryptographyArt of writing messages so that no one other than

intended receiver can read it.Encryption – Performing mathematical operations

to hide message content.Decryption – Reverse of encryption to get original

messagePlain Text – A clear unencrypted message.Cipher – An Algorithm to encrypt plain text and

convert it into seemingly nonsensical cipher text. Cipher Text – The finally encrypted text

Page 3: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Some Well known MethodsPublic Key and Private Key Systems – Uses a

Public Key to encrypt and Private key is used to decrypt message.

One Time Pad(OTP) – The OTP is the random key , same length as message, applied once and only once. Theoretically IMPOSSIBLE to decipher the message without the key.

Some Other methods are RSA, DES, Double

DES , Triple DES, Digital Signatures etc.

Page 4: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Quantum ComputingSuperfast Computing. Based on the principles of

Quantum Theory .Photons will be the data carriers.Building Blocks are “QUBITS”. A QUBIT can be 0

or 1 at the same time.Operations are performed on QUBITS and their

properties.Can factorize 250 digit number in finite time.Finding Key of is just a matter of time.Present encryption techniques will become

useless.

Page 5: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Important factsThe properties of photons are tied together so tightly

that measuring one property will cause change in other thus disturbing the whole system

In Quantum World A particle can be in any state until it is observed. Once observed It gets settled in that state.

The concept of uncertainty states that One cannot have the knowledge about two properties of a photon at the same time . For example Heisenberg uncertainty principle.

Page 6: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

The concept of Quantum Entanglement states that photons are so closely related that it is impossible to describe One without another.

An attempt to measure the property of one photon will immediately Affect the other Photon.

It is like One Photon talking to Another photon in no time.

Page 7: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Quantum Cryptography The property of photons used in Quantum

Cryptography is “Polarization” .Light Waves moves in every plane.Polarization is the act of selecting light waves of

a particular plane.In Linear polarization Light can be polarized

either horizontally or vertically.In circular polarization light waves are made to

move in circular fashion.

Page 8: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Linear and circular polarization are bound with uncertainty .

Measurement of linear polarization will destroy measurement of circular polarization.

1. Light travels in all planes. 2. Horizontal 1. Light travels in all planes. 2. Horizontal Polarisation—isolating Polarisation—isolating light that travels horizontally light that travels horizontally3. Vertical Polarisation 4. Circular polarisation3. Vertical Polarisation 4. Circular polarisation

Page 9: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Artur Ekert’s Card TrickGiven by Artur Ekert in 1991 to explain quantum

cryptography.There is a whole bunch of sealed envelops with red

and blue cards, marked with 0 and 1, in them.two machines to read the cards. Red and blue

machine.Red machine understands red card and blue

machine understands blue card.Red card with 1,in red machine will output 1.Similarly for Blue cards with blue machine.If Red card with 0 is inserted in blue machine , it

will throw a random guess of 0 or 1.

Page 10: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Page 11: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Let us say there are two people Alice and Bob who want s to share the secret key safely.

We hand over one sealed envelop to each.They will get the same results if they use the same

color machine.This happens due to the concept of quantum

entanglement.When Alice‘s blue machine says the card is blue and

1 written on it, then both the cards are blue. And so blue machine of Bob will process the card as blue and yield the same result.

For sharing key they only tell each other what machine they used for every card and not the card.

Page 12: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Due to Quantum Entanglement they will get same result every time they use same machine.

To verify they will tally some of the values. The tally values and different machine values are

discarded.The remaining left is the KEY.

The measurements that Alice (top row) and Bob (bottom row) make. They get thesame result when they make the same measurement.

Page 13: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Now that they’ve made their measurements, they only keep the results where they both used the same machine

They pick random results and compare them to see if there were errors

Page 14: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Finally, the Key!

Page 15: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Final WordsThe Concept of quantum cryptography has been

around since the 1970’s .Working models have been set up in educational

institutes.Can be implemented on fiber optics Network,

which is not very common.Infrastructure for quantum cryptography system is

Expensive.Companies like New York’s MagiQ New York’s MagiQ and

Geneva’s idQuantique Geneva’s idQuantique are already providing quantum cryptography solutions to bank’s and military.

Page 16: Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.

Thank Thank YouYou