Quantum Encryption. Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by.

Slides:



Advertisements
Similar presentations
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Advertisements

Section 2: The Nature of Light
How do scientific models describe light?
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
Fiber-Optic Communications James N. Downing. Chapter 10 Fiber-Optic Test and Measurement.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Cyclotron Resonance and Faraday Rotation in infrared spectroscopy
Chapter 2 Basic Encryption and Decryption (part B)
Lecture 23 Symmetric Encryption
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews.
CSCI 4550/8556 Computer Networks Comer, Chapter 4: Transmission Media.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Lecture 3 INFRARED SPECTROMETRY
Network Security Chapter
Digital Revolution LOs: Describe an analogue and digital signal Contrast analogue and digital waves Argue whether digital is better than analogue Key words:
Cryptography Week-6.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Lecture 2 Overview.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
CS110: Computers and the Internet Encryption and Certificates.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Cryptography By, Anthony Lonigro & Valentine Mbah.
LIS508 last lecture: Cryptography & Security Thomas Krichel
ITMS – 3153 Information Systems Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
Cryptography (Traditional Ciphers)
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
People to People Communication Technology Education.
Encryption CS110: Computer Science and the Internet.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
For 3 rd year students- Biophysics Department – Faculty of Science – Cairo University Prepared by: Dr. Heba Mohamed Fahmy and Dr. Alaa Mamdouh.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
TELECOMMUNICATION. Communication over a long distance.
Fourier Transform IR Spectroscopy. Absorption peaks in an infrared absorption spectrum arise from molecular vibrations Absorbed energy causes molecular.
Lecture 2 Overview. Cryptography Secret writing – Disguised data cannot be read, modified, or fabricated easily – Feasibility of complexity for communicating.
1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
Sound and LightSection 2 Waves and Particles 〉 How do scientific models describe light? 〉 The two most common models describe light either as a wave or.
 FT-IR stands for Fourier Transform Infrared, the preferred method of infrared spectroscopy. In infrared spectroscopy, IR radiation is passed through.
Chapter 2 Basic Encryption and Decryption
THEORIES OF LIGHT Is light a wave or a stream of particles?
Chapter 3:Cryptography (16M)
Quantum Cryptography Alok.T.J EC 11.
Learning Outcomes By the end of this topic students should be able to:
Learning Outcomes By the end of this topic students should be able to:
Unit 2: Cryptography & Cryptographic Algorithm
Computer Security Chapter Two
Cryptanalysis Network Security.
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

Quantum Encryption

Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by Vigenere’s Cipher Very weak to frequency cryptanalysis

Transposition: Rearranges the letters systematically but does not change their value Still weak to frequency and and common word attacks

One-time pad: Similar to substitution Adds a randomly-generated key to the message Absolutely secure because the key is longer than the message and used only once

Overview of Conventional Encryption: Secure for private use, but requires secure transmission of private key A variation on private key encryption, public key encryption, provides a workaround for key transmission on the internet, but if intercepted is not 100% secure

Quantum Cryptography Points of Interest Provides 100% secure transmission of a private key of unlimited length Requires uninterrupted photon stream for transmission The original message is encoded and sent via quantum polarities of the light

Fiber Optic Cable For communications, many hair-thin pieces are used because they transmit better than one thick piece For normal data transmission pulses of light are used, and travel much better than the quantum polarities used for quantum transmission

Usual Process of Fiber Optic Communication Pulses of light are sent through fiber optics to relay huts Quantum Cryptography Message is encrypted and sent in quantum polarities of the light

Polarization Describes the vibrational direction of the electric field associated with the light

Continuous Photon Stream Requires unbroken length of fiberoptic cable Sensitive to any interception, due to uncertainty principle

The FTIR: Fourier Transform Infrared spectrometer Transmits the full IR spectrum Analyzes the full spectrum simultaneously Automatically graphs data Beam splitter Range of motion of mirrors Light source and detector Advantages:Limiting Factors:

FTIR and Fiber Optics: What we did Acquired FTIR drivers license Acquired fiber optic cable Set up consisted of a ring stand suspending the fiber optic cable in line with FTIR source and detector Ran a series of scans on one sample of fiber optic cable

Results Wave number % Transmittance