Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Quant Cryptography

Quant Cryptography



|Views: 64|Likes:
Published by shireeshagudimalla
Find this..
Find this..

More info:

Published by: shireeshagudimalla on Feb 23, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Seminar Report On
Submitted by
In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information ScienceDEPARTMENT OF COMPUTER SCIENCECOCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGYKOCHI-6820222008
I thank 
almighty for guiding me throughout the seminar. I would like tothank all those who have contributed to the completion of the seminar and helped mewith valuable suggestions for improvement.I am extremely grateful to
Prof. Dr. K Poulose Jacob, Director, Department of Computer Science,
for providing me with best facilities and atmosphere for the creativework guidance and encouragement. I would like to thank my coordinator,
Mr.G.Santhosh Kumar, Lecturer, Department of Computer Science,
for all help andsupport extend to me. I thank all staff members of my college and friends for extendingtheir cooperation during my seminar.Above all I would like to thank my parents without whose blessings, I would nothave been able to accomplish my goal.
Quantum cryptography uses quantum mechanics to guarantee securecommunication. It enables two parties to produce a shared random bit string known onlyto them, which can be used as a key to encrypt and decrypt messages.An important and unique property of quantum cryptography is the ability of thetwo communicating users to detect the presence of any third party trying to gainknowledge of the key. This results from a fundamental part of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third partytrying to eavesdrop on the key must in some way measure it, thus introducing detectableanomalies. By using quantum superpositions or quantum entanglement and transmittinginformation in quantum states, a communication system can be implemented whichdetects eavesdropping. If the level of eavesdropping is below a certain threshold a keycan be produced which is guaranteed as secure, otherwise no secure key is possible andcommunication is aborted.The security of quantum cryptography relies on the foundations of quantummechanics, in contrast to traditional public key cryptography which relies on thecomputational difficulty of certain mathematical functions, and cannot provide anyindication of eavesdropping or guarantee of key security.Quantum cryptography is only used to produce and distribute a key, not totransmit any message data. This key can then be used with any chosen encryptionalgorithm to encrypt and decrypt a message, which can then be transmitted over astandard communication channel. The algorithm most commonly associated with QKD isthe one-time pad, as it is provably secure when used with a secret, random key.
qubit, uncertainty, entanglement, bit commitment, BB84 protocol, Ekert protocol, key distribution, one-time-pad

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
anujachinju liked this
srivathsan8603 liked this
vjay001 liked this
abda1996 liked this
abda1996 liked this
stinglokesh liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->