Professional Documents
Culture Documents
Cryptography
Cryptography
“Secret Writing”
Network Security
Motivation
Age of Information and universal
electronic connectivity
Information is valuable
Cryptosystem is a five-tuple
(P,C,K,E,D)
Cryptographic algorithm also called
cipher is a mathematical function used
for encryption and decryption of
messages
Classical Cryptography
Eavesdropper
Eve
C-Ciphertext
Secure
Channel
The process
Plaintext Key
Encryption
Cryptotext Secure
transmission
Decryption
Plaintext
0 1
+
X
Binary information
Each type of photon spin represents one piece of information-usually 1 or 0
Foundation of Quantum
Cryptography:
Heisenberg Uncertainty Principle
Certain pairs of physical properties are
related in such a way that measuring one
property prevents the observer from
knowing the value of the other.
When measuring the polarization of a
photon, the choice of what direction to
measure affects all subsequent
measurements
How photons are polarized
Provably Secure
Evidence of Tampering
Quantum Privacy Attacks
Soumya.K.U
MCA(s5)