By Jeff Hinson CS691, Summer 2009

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age.
Gagan Deep Singh GTBIT (IT) August 29,2009.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Introduction network Protocol
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Storage System Optimization. Introduction Storage Types-DAS/NAS/SAN The purposes of different RAID types. How to calculate the storage size for video.
Quantum Teleportation What does the future hold?.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Institute of Physics (IOP), Bhubaneswar
Quantum Key Distribution in the GÉANT network
Contents Computer Network Benefits of Computer Network
Go to youtube and search “Code.org internet videos”
Data Communication and Networking
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Internet & Communications Technology
Quantum Information Promises new insights Anthony J
Electronic Communication
Packets and Making a Reliable Internet
QUANTUM CRYPTOGRAPHY.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Lecture 14: Blocking and Catching Photons Background
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Internet Basics Videos
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Presentation transcript:

By Jeff Hinson CS691, Summer 2009 Quantum Cryptography By Jeff Hinson CS691, Summer 2009

Brief History Idea born in late 60’s with Stephan Wiesner’s “Conjugate Coding” 1st successful quantum exchange: October 1989 Charles Bennet and Gilles Brassard expand idea to “Quantum Key Distribution Channel” Has been a growing topic, especially in the past decade CS691 Jeff Hinson Summer 2009

Quantum Channels Needed equipment: The idea: Fiber-optic cable photon cannons on each end filters for polarization The idea: Two computers: Alice and Bob Alice polarizes a photon using a filter, sends to Bob Bob receives photon, tries to read using a filter; guesses the polarization CS691 Jeff Hinson Summer 2009

Quantum Channels (cont.) Problem: unrealistic for regular use unreliable, Bob must guess Alice’s polarization normal internet connection still needed to verify accuracy of transmission on quantum channel Photon-reading is slow, especially over large distances (~10kb/s) Advantages: difficult to hack; can tell if someone is eavesdropping on the line... CS691 Jeff Hinson Summer 2009

Quantum Key Distribution Makes quantum channels more realistic The Idea: use a quantum channel to send photons from Alice to Bob Bob tells Alice what he thinks Alice’s polarizations were Alice confirms/denies. Wrong bits are discarded, remaining bits are the new key Key is used to encrypt/decrypt data send over a regular channel CS691 Jeff Hinson Summer 2009

Quantum Key Distribution (cont.) Cons still expensive slow connection over short distances Pros very secure; is difficult to guess the key can tell if someone is eavesdropping: measuring the photos will change their state if Bob gets X number of bits wrong, eavesdropping is assumed; key discarded and a new channel is used to distribute the key CS691 Jeff Hinson Summer 2009

Eavesdropping Intercepting/Resend Beam-splitting traditional approach; easily detectable ideas to read momentum without measuring; study still shows it to be detectable Beam-splitting Photons difficult to send one at a time; if multiple photons are sent, eavesdropper can split beam to read one and pass others on without being detected Is difficult to do, highly unreliable, and chance of detection still exists CS691 Jeff Hinson Summer 2009

In the News... Cambridge team found way to transmit up to 10mb/s over large distance (20km) on lower-cost components Spain plans to release 1st metropolitan quantum cryptography network by 2010 Austrian scientists made successful quantum connection over 90mi distance CS691 Jeff Hinson Summer 2009

Conclusions Quantum channel not likely to be used for regular connections anytime soon Quantum Key Distribution is a good idea, and is very quickly becoming realistic As scientific advancements are made, cost will decrease, and reliability and efficiency will increase It sounds like a lot of fun, and makes for good dinner conversation.... CS691 Jeff Hinson Summer 2009

Questions/Comments?