QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc 8230. Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Computer Architecture Lecture 30 Fasih ur Rehman.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Lecture from Quantum Mechanics. Marek Zrałek Field Theory and Particle Physics Department. Silesian University Lecture 11.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
J. Miranda University of Ottawa 21 November 2003
QUANTUM CRYPTOGRAPHY.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc 8230

Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics.  The appealing characteristic of quantum cryptography is the possibility of distributing secret key between two users in a manner that it is impossible for a third party to eavesdrop without changing the quantum transmission and hence the eavesdropping is detected by users

BB84 Protocol [1,3]  The sender (traditionally referred to as Alice) and the receiver (Bob) are connected by a quantum communication channel which allows quantum states to be transmitted.  In addition they communicate via a public classical channel.  This protocol encodes the information in pair of non-orthogonal states.  The usual polarization state pairs used are either the rectilinear basis of vertical (0°) and horizontal (90°), the diagonal basis of 45° and 135°(-45).

BB84 Protocol Contd.. [3,4]  Alice creates a random bit (0 or 1) and then randomly selects one of her two basis to transmit it in.  She then prepares a photon polarization state depending both on the bit value and basis.  Alice then transmits a single photon in the state specified to Bob, using the quantum channel.  This process is then repeated.  Bob does not know the basis the photons were encoded in, so select a basis at random to measure in.  After receiving all photons Bob communicate Alice on public channel.  Alice broadcasts the basis each photon was sent in, and Bob the basis each was measured in.

BB84 Protocol Contd.. [3,4]

 To check for the presence of eavesdropping Alice and Bob now compare a certain subset of their remaining bit strings.  If a third party (Eve) has gained any information about the photons' polarization, this will have introduced errors in Bobs' measurements.  If more than p bits differ they abort the key and try again.  p is chosen so that if the number of bits known to Eve is less than this, privacy amplification can be used to reduce Eve's knowledge of the key to an arbitrarily small amount, by reducing the length of the key.

Using Quantum Cryptography for securing Wireless LAN networks, 2009 International Conference on Signal Processing Systems[5] MIC – message integrity code Here telecommunication is not based on the optical-fibers but rely on free space line-of-sight-communication systems. Paper suggest how we can integrate Quantum key distribution in i (WLAN), by modifying the 4-way handshake to integrate the BB84 protocol as presented:

Implementations [2,3]  There are currently four companies offering commercial quantum cryptography systems; id Quantique (Geneva), MagiQ Technologies (New York), SmartQuantum (France) and Quintessence Labs (Australia).  Quantum encryption technology provided by the Swiss company Id Quantique was used in the Swiss state of Geneva to transmit ballot results to the capitol in the national election occurred on Oct. 21, (Shows how secured method it is)  The world's first computer network protected by quantum cryptography was implemented in October 2008, at a scientific conference in Vienna. The network used 200 km of standard fibre optic cable to interconnect six locations across Vienna and the town of St Poelten.

References [1]10th INTERNATIONAL CONFERENCE AND SEMINAR EDM'2009, SECTION III, JULY 1-6, ERLAGOL Quantum Cryptography Vladimir L. Kurochkin, Igor G. Neizvestny Institute ofSemiconductor Physics, Siberian Division, RAS, Novosibirsk, Russia [2]2009 Sixth International Conference on Information Technology: New Generations, Quantum Cryptography: A New Generation of Information Technology Security System by Mehrdad S. Sharbaf. [3] [4] Bennett, Ch. H., & Brassard, G., ”Quantum cryptography: public key distribution and coin tossing”, IEEE Conference on Computer, Systems, and signal Processing, 1984 [5]2009 International Conference on Signal Processing Systems “Using Quantum Cryptography for securing Wireless LAN networks” by A.Falahati, Hadi Meshgi

Questions/Discussions