You are on page 1of 24

Quantum

Cryptography
Cryptography
 “Secret Writing”
 Network Security

Motivation
 Age of Information and universal
electronic connectivity
 Information is valuable

 Protecting that Information


Cryptography

 Science of keeping private Authentication

information from unauthorized Integrity


access
 Purpose: Privacy

Transmit information in such a way that


access to it is restricted entirely to the
intended recipient, even if the
transmission itself is received by others
Two parties, Alice and Bob, wish to exchange messages via some insecure
channel in a way that protects their messages from eavesdropping.
Classical Cryptography

Cryptosystem is a five-tuple
(P,C,K,E,D)
 Cryptographic algorithm also called
cipher is a mathematical function used
for encryption and decryption of
messages
Classical Cryptography
Eavesdropper
Eve

C-Ciphertext

Transmitter Alice Receiver Bob

IInfo P-Plaintext C-Ciphertext


Insecure
C-Ciphertext P-plaintext
Info
Source Encryptor Decryptor
Channel Sink

Secure
Channel
The process
Plaintext Key

Encryption

Cryptotext Secure
transmission
Decryption

Plaintext

Key ready for use


Message encryption
Secure key distribution
Hard Problem for
conventional
The classic cryptography
•Encryption algorithm and related key are kept
secret.
•Breaking the system is hard due to large numbers of
possible keys.
•For example: for a key 128 bits long
•There are
2 128
 10 38

keys to check using brute force.

•The fundamental difficulty is key distribution to


parties who want to exchange messages.
solution for
key distribution problem?
Quantum Cryptography
 revolutionize secure communication
 classical cryptography relies on the
limitations of various mathematical
techniques or computing technology
 In quantum cryptography the
information is protected by the laws
of physics.
The main contribution of
Quantum Cryptography
 It solved the key distribution problem.
 Uses photons to transmit key

 Once key is transmitted Coding and


encoding using the normal secret key
method
How photons???

How do you attach


information to photon?????
Elements of the Quantum
Theory
 Light waves are propagated as discrete
quanta called photons.
Properties of photons
 They are mass less and smallest measure of
light
 They can exist in all of their possible states at
once
 Light in this state is called unpolarized
How photons are polarized

0 1
+
X
Binary information
Each type of photon spin represents one piece of information-usually 1 or 0
Foundation of Quantum
Cryptography:
Heisenberg Uncertainty Principle
 Certain pairs of physical properties are
related in such a way that measuring one
property prevents the observer from
knowing the value of the other.
 When measuring the polarization of a
photon, the choice of what direction to
measure affects all subsequent
measurements
How photons are polarized

• If a photon with vertical spin is measured through a diagonal filter,


1)won’t pass through the filter
2)Affects the photon’s behavior(causing it to take diagonal spin)
So information on the photon’s original polarization lost ,
and so the information also lost
Quantum key distribution
 Alice communicates with Bob via a quantum channel
sending him photons.
 Alice uses her polarizer's to send randomly photons to Bob
in one of the four possible polarizations 0,45,90,135
degree.
 Bob uses his polarizer's to measure each polarization of
photons he receives.
 He can use the basis or the but not both
simultaneously(One with the 0-90 degree basis and one
with 45-135 degree basis )
 Then they discuss results using a public channel.
 After getting an encryption key Bob can encrypt his
messages and send them by any public channel.
Introducing EVE
Quantum Security Benefits

 Provably Secure

 Evidence of Tampering
Quantum Privacy Attacks

 No protection against the classic


Bucket brigade attack(“Man-in-the –
middle attack”)
Future Scope

 Faster photon detectors


 Reliable Quantum Key Distribution
Thanks…….

Soumya.K.U
MCA(s5)

You might also like