210 likes | 366 Views
Quantum Cryptography. Cryptography. Art of writing messages so that no one other than intended receiver can read it. Encryption – Performing mathematical operations to hide message content. Decryption – Reverse of encryption to get original message Plain Text – A clear unencrypted message.
E N D
Cryptography • Art of writing messages so that no one other than intended receiver can read it. • Encryption – Performing mathematical operations to hide message content. • Decryption – Reverse of encryption to get original message • Plain Text – A clear unencrypted message. • Cipher – An Algorithm to encrypt plain text and convert it into seemingly nonsensical cipher text. • Cipher Text – The finally encrypted text
Some Well known Methods • Public Key and Private Key Systems – Uses a Public Key to encrypt and Private key is used to decrypt message. • One Time Pad(OTP) – The OTP is the random key , same length as message, applied once and only once. Theoretically IMPOSSIBLE to decipher the message without the key. • Some Other methods are RSA, DES, Double DES , Triple DES, Digital Signatures etc.
Quantum Computing • Superfast Computing. Based on the principles of Quantum Theory . • Photons will be the data carriers. • Building Blocks are “QUBITS”. A QUBIT can be 0 or 1at the same time. • Operations are performed on QUBITS and their properties. • Can factorize 250 digit number in finite time. • Finding Key of is just a matter of time. • Present encryption techniques will become useless.
Important facts • The properties of photons are tied together so tightly that measuring one property will cause change in other thus disturbing the whole system • In Quantum World A particle can be in any state until it is observed. Once observed It gets settled in that state. • The concept of uncertainty states that One cannot have the knowledge about two properties of a photon at the same time . For example Heisenberg uncertainty principle.
The concept of Quantum Entanglement states that photons are so closely related that it is impossible to describe One without another. • An attempt to measure the property of one photon will immediately Affect the other Photon. • It is like One Photon talking to Another photon in no time.
Quantum Cryptography • The property of photons used in Quantum Cryptography is “Polarization” . • Light Waves moves in every plane. • Polarization is the act of selecting light waves of a particular plane. • In Linear polarization Light can be polarized either horizontally or vertically. • In circular polarization light waves are made to move in circular fashion.
Linear and circular polarization are bound with uncertainty . • Measurement of linear polarization will destroy measurement of circular polarization. 1. Light travels in all planes. 2. Horizontal Polarisation—isolating light that travels horizontally 3. Vertical Polarisation 4. Circular polarisation
Artur Ekert’s Card Trick • Given by ArturEkert in 1991 to explain quantum cryptography. • There is a whole bunch of sealed envelops with red and blue cards, marked with 0 and 1, in them. • two machines to read the cards. Red and blue machine. • Red machine understands red card and blue machine understands blue card. • Red card with 1,in red machine will output 1. • Similarly for Blue cards with blue machine. • If Red card with 0 is inserted in blue machine , it will throw a random guess of 0 or 1.
Let us say there are two people Alice and Bob who want s to share the secret key safely. • We hand over one sealed envelop to each. • They will get the same results if they use the same color machine. • This happens due to the concept of quantum entanglement. • When Alice‘s blue machine says the card is blue and 1 written on it, then both the cards are blue. And so blue machine of Bob will process the card as blue and yield the same result. • For sharing key they only tell each other what machine they used for every card and not the card.
Due to Quantum Entanglement they will get same result every time they use same machine. • To verify they will tally some of the values. • The tally values and different machine values are discarded. • The remaining left is the KEY. The measurements that Alice (top row) and Bob (bottom row) make. They get the same result when they make the same measurement.
Now that they’ve made their measurements, they only keep the results where they both used the same machine They pick random results and compare them to see if there were errors
Final Words • The Concept of quantum cryptography has been around since the 1970’s . • Working models have been set up in educational institutes. • Can be implemented on fiber optics Network, which is not very common. • Infrastructure for quantum cryptography system is Expensive. • Companies like New York’s MagiQand Geneva’s idQuantiqueare already providing quantum cryptography solutions to bank’s and military.
Thank You