quantam cryptography

25
QUANTAM CRYPTOGRAPHY -SECRECY ENSURED

Upload: elmer

Post on 24-Feb-2016

59 views

Category:

Documents


0 download

DESCRIPTION

-SECRECY ENSURED. QUANTAM CRYPTOGRAPHY. TABLE OF CONTENT. INTRODUCTION. CLASSICAL CRYPTOGRAPHY. QUANTAM CRYPTOGRAPHY. WORKING. KEY DISTRIBUTUION. TECHNOLOGY. SECURITY. A DVANTAGES. LIMITATIONS. CONCLUSION. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: QUANTAM  CRYPTOGRAPHY

QUANTAM CRYPTOGRAPHY

-SECRECY ENSURED

Page 2: QUANTAM  CRYPTOGRAPHY

TABLE OF CONTENT

TECHNOLOGYKEY DISTRIBUTUION

CLASSICAL CRYPTOGRAPHY

QUANTAM CRYPTOGRAPHY

WORKING

INTRODUCTION

SECURITY

CONCLUSION

ADVANTAGES LIMITATIONS

Page 3: QUANTAM  CRYPTOGRAPHY

INTRODUCTION The recent application of the principles

of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication.

Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information.

Page 4: QUANTAM  CRYPTOGRAPHY

CRYPTOGRAPHY The whole point of cryptography is to

keep information out of the hands of anyone but its intended recipient.

Even if the message gets intercepted, the meaning won’t be apparent to the intercepted – unless the interceptor is able to decipher it.

Page 5: QUANTAM  CRYPTOGRAPHY

Principle of Cryptography.

Page 6: QUANTAM  CRYPTOGRAPHY

A PRACTICAL EXAMPLE -

Alice wants to send a message to Bob, without an eavesdropper Eve intercepting the message.

Page 7: QUANTAM  CRYPTOGRAPHY

TYPE OF CRYPTOGRAPHY

CRYPTOGRAPHY

Classical Quantum

Page 8: QUANTAM  CRYPTOGRAPHY

THE CLASSICAL CRYPTOGRAPHY Encryption algorithm and related

key are kept secret. Breaking the system is hard due to

large numbers of possible keys.

For example: for a key 128 bits long there are – keys to

check.38128 102

Page 9: QUANTAM  CRYPTOGRAPHY

THE QUANTUM CRYPTOGRAPHY An important and unique property of

quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key.

Quantum technology promises to revolutionize secure communication at an even more fundamental level.

Page 10: QUANTAM  CRYPTOGRAPHY

THE QUANTUM CRYPTOGRAPHY Quantum Cryptography – ensuring the most

secure transmission of the secret information – works on the principle of – “ Quantum Mechanics”.

Transmission is carried out at the bit level with the help of various types of alignment of the photons.

It also solves the problem of key distribution arising in the Classical Cryptography.

Page 11: QUANTAM  CRYPTOGRAPHY

WORKING

Page 12: QUANTAM  CRYPTOGRAPHY
Page 13: QUANTAM  CRYPTOGRAPHY
Page 14: QUANTAM  CRYPTOGRAPHY

QUANTUM KEY DISTRIBUTION A user can suggest a key by sending a

series of photons with random polarizations. This sequence can then be used to generate a sequence of numbers. The process is known as quantum key distribution.

Main Features: Key distribution distance: up to 60 km Key distribution rate: up to 1000 bits/s

Page 15: QUANTAM  CRYPTOGRAPHY

QUANTUM CRYPTOGRAPHY TECHNOLOGY

Photon Source.

Photon Detector.

Communication channel.

Page 16: QUANTAM  CRYPTOGRAPHY

PHOTON SOURCE

Photon Gun.

Light - emitting p-n junction.

Single ion.

Page 17: QUANTAM  CRYPTOGRAPHY

PHOTON DETECTOR

Avalanche photodiodes.

Germanium detectors.

Silicon.

Photo multiplier.

Page 18: QUANTAM  CRYPTOGRAPHY

COMMUNICATION CHANNEL

Fiber optical communication link.

Free – space laser communication.

Page 19: QUANTAM  CRYPTOGRAPHY

SECURITY OF QKD Quantum cryptography obtains its

fundamental security from the fact that each qubit of information is carried by a single photon, and that each photon will be altered as soon as it is read once.

This makes impossible to intercept message without being detected.

Page 20: QUANTAM  CRYPTOGRAPHY

EFFECT OF NOISE The presence of noise can impact

detecting attacks. Eavesdropper and noise on the

quantum channel are indistinguishable.

Detecting eavesdropper in the presence of noise is hard.

Page 21: QUANTAM  CRYPTOGRAPHY

APPLICATION

E-mail messages. Telephone calls. Financial Transactions.

Page 22: QUANTAM  CRYPTOGRAPHY

ADVANTAGES

The most important contribution of quantum cryptography is a mechanism for detecting eavesdropping. 

Quantum key distribution enables “encrypted communications on demand,” because it allows key generation at transmission time over an unsecured optical communications link.

Page 23: QUANTAM  CRYPTOGRAPHY

LIMITATIONS We have to use pure fiber optic end-to-end

network and boosters are needed at some distance, so it is expensive.

It will also be critical to authenticate the identity of the recipients.

It is also not clear how to modify the scheme in order to deal with noisy quantum transmissions.

It is hard to transmit a photon, entangled over great distances. Photon detectors aren't particularly reliable.

Page 24: QUANTAM  CRYPTOGRAPHY

CONCLUSION Currently it works only over short distances,

but there are situations in which even short-distance transmission is useful. Also, with sufficient technical improvements, it might be possible in the future to implement quantum cryptography over long distances.

The devices for implementing such methods exist and the performance of demonstration systems is being continuously improved. Within the next few years, such systems could start encrypting some of the most valuable secrets of government and industry.

Page 25: QUANTAM  CRYPTOGRAPHY

THANK-YOUCREDITS

NISARG TRIVEDI