Professional Documents
Culture Documents
Quantum Cryptography
In 1984 Bennett and Brassard describe how the quantum money idea with its basis {0,1} vs. {+,-} can be used in quantum key distribution protocol Measuring a quantum system in general disturbs it and yields incomplete information about its state before the measurement
Goals of Talk
Very brief summary of cryptography
Impact of technology
Explain two types of quantum crypto protocols Show how to break quantum crypto
To understand the engineering difficulties of going from theory to practice
Classical Cryptography
mputational security
Practical; widely used Examples: AES, DES, RC-4, RSA, DH
Unconditional security
Breaking is impossible Not practical for most applications Example: One-time pad Problem: Key Distribution
9.
Uses Entagled Pairs. Both Alice and Bob have one of the pairs. Any attempt at eavesdropping will destroy the entanglement such that Alice and Bob will detect the interference.
THANK YOU