SlideShare une entreprise Scribd logo
1  sur  23
Quantum
cryptography
:Public key distribution and coin tossing
Research :
Charles H. Bennett & Gilles Brassard
Present by : Ruwan Ranganath Senarathne
Outline Quantum Cryptography
Essential properties of polarized photons
Quantum public key distribution
Quantum coin tossing
BB84 Protocol
Q & A
Ultimate Goal
Cryptography
• The Art of Writing or Solving Codes.
• Classical Cryptography > Modern Cryptography > Number Theory based Public Key
Cryptography
• One Time Pad
• Key Generation and Key Distribution
Background
● Conventional cryptosystems such as ENIGMA, DES, RSA
● Digital communications in principle can always be passively monitored or copied
● Unless the key,used once only and long as clear text
● Computational complexity is not well enough understood
● Quantum Computers can use Shor’ Algorithm to break
Quantum cryptography uses photons to transmit a key.
Quantum cryptology depends on physics, not mathematics.
Heisenberg's Uncertainty Principle & Photon Polarization
Quantum key distribution protocols
Quantum Cryptography
QC = QKD + OTP
Background
● Conventional Computing - Bits
● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ
● Qubit could be a Photon, Electron, Nucleus..
● In a Quantum State particle can achieve a “Superposition”
● Quantum Computers can overcome todays computational limitations
Essential properties of polarized photons
• Photons - Photons are the fundamental particle of light.
– wave function : An individual photon can be described as having right or left circular
polarization, or a superposition of the two.
• The foundation of quantum physics is the unpredictability factor.
– Heisenberg's Uncertainty Principle :
• Photon polarization
– polarization filters, photon to take one state or another -- or polarize it.
• Rectilinear basis (0 and 90 degrees)
• Diagonal basis (45 and 135 degrees)
• Heisenberg uncertainty principle :
- states that certain pairs of physical properties are related in such a way that measuring one
property prevents the observer from simultaneously knowing the value for other.
• Principle of photon polarization:
- tells that an eavesdropper cannot copy unknown Qubits
Explanation
Source :: http://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/#hup
QKD Protocols
• A protocol is a set of rules governing the exchange of messages over a channel.
• A security protocol is a special protocol designed to ensure security properties are met during
communications.
• There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
Eve
• Unique property gain knowledge about eve trying get the key
• By using quantum superposition/entanglement and transmitting information in quantum states , a
communication system can be implemented which can detect eavesdropping.
• If the level of eavesdropping is below threshold , a key is produced guarantying the secure
communication otherwise no secure key is possible and communication is aborted
BB84 Communication Protocol
● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard
in 1984.
● It is the first quantum cryptography protocol
● Use Photon polarization
● four different non-orthogonal quantum states via a quantum channel to transmit the qubits
● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell
can be used too.
● The polarization basis is the mapping we decide to use for a particular state
● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the
horizontal and -45 o polarisations to encode the 1"
● Bob then randomly uses either a polarizer for diagonal polarisations or one in the
horizontal/vertical basis and records his choice and the polarization he measures
● Bob tells Alice on the public channel the sequence of analyzers he used during the
transmission, but not his results
● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons
she sent
● these compatible bits are used for the shared key
BB84 with eavesdropping
• If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s
measurements.
• In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect
measurement: Eve’s measurements are bound to affect the states of the photons.
• As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new
photons to Bob.`
• The photon states cannot be cloned (non-clone ability).
• Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
Quantum coin tossing
➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983
➔ Two unknown party communicate without third party
Quantum coin tossing ( cont>._)
Coin Tossing (Cont>._)
● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) .
● Use the polarization and send to Bob
● Bob use polarizer for each bit
● Two tables Rectilinear and diagonal photon table
● Polarizer can loss some photons
● Bob Make his guess
● Alice says if bob wins and tell her basis and
● Send entire bit sequece over classical channel
● Bob verify no cheating by providing his tables
Current Arguments
QKD is not Public key Cryptography
Eve can sabotage quantum channel to force Alice and Bob use classical channel
Expensive for longer keys
Thank you.
Quantum Cryptography - Quantum Coin Tossing

Contenu connexe

Tendances

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Kirby Linvill
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyAlexandre Augusto Giron
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 

Tendances (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 

Similaire à Quantum Cryptography - Quantum Coin Tossing

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
B03250609
B03250609B03250609
B03250609theijes
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksMaria Stylianou
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key DistributionIRJET Journal
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONIJNSA Journal
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESIJNSA Journal
 

Similaire à Quantum Cryptography - Quantum Coin Tossing (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
B03250609
B03250609B03250609
B03250609
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 

Plus de Ruwan Ranganath

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brandRuwan Ranganath
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom mattersRuwan Ranganath
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introRuwan Ranganath
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile ApplicationsRuwan Ranganath
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016Ruwan Ranganath
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communitiesRuwan Ranganath
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system Ruwan Ranganath
 

Plus de Ruwan Ranganath (10)

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brand
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa intro
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile Applications
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communities
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system
 
Benefits of using foss
Benefits of using fossBenefits of using foss
Benefits of using foss
 
Sl2 college web team
Sl2 college web teamSl2 college web team
Sl2 college web team
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Quantum Cryptography - Quantum Coin Tossing

  • 1. Quantum cryptography :Public key distribution and coin tossing Research : Charles H. Bennett & Gilles Brassard Present by : Ruwan Ranganath Senarathne
  • 2. Outline Quantum Cryptography Essential properties of polarized photons Quantum public key distribution Quantum coin tossing BB84 Protocol Q & A
  • 4. Cryptography • The Art of Writing or Solving Codes. • Classical Cryptography > Modern Cryptography > Number Theory based Public Key Cryptography • One Time Pad • Key Generation and Key Distribution
  • 5. Background ● Conventional cryptosystems such as ENIGMA, DES, RSA ● Digital communications in principle can always be passively monitored or copied ● Unless the key,used once only and long as clear text ● Computational complexity is not well enough understood ● Quantum Computers can use Shor’ Algorithm to break
  • 6. Quantum cryptography uses photons to transmit a key. Quantum cryptology depends on physics, not mathematics. Heisenberg's Uncertainty Principle & Photon Polarization Quantum key distribution protocols Quantum Cryptography QC = QKD + OTP
  • 7. Background ● Conventional Computing - Bits ● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ ● Qubit could be a Photon, Electron, Nucleus.. ● In a Quantum State particle can achieve a “Superposition” ● Quantum Computers can overcome todays computational limitations
  • 8. Essential properties of polarized photons • Photons - Photons are the fundamental particle of light. – wave function : An individual photon can be described as having right or left circular polarization, or a superposition of the two. • The foundation of quantum physics is the unpredictability factor. – Heisenberg's Uncertainty Principle : • Photon polarization – polarization filters, photon to take one state or another -- or polarize it. • Rectilinear basis (0 and 90 degrees) • Diagonal basis (45 and 135 degrees)
  • 9. • Heisenberg uncertainty principle : - states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value for other. • Principle of photon polarization: - tells that an eavesdropper cannot copy unknown Qubits Explanation
  • 11. QKD Protocols • A protocol is a set of rules governing the exchange of messages over a channel. • A security protocol is a special protocol designed to ensure security properties are met during communications. • There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
  • 12. Eve • Unique property gain knowledge about eve trying get the key • By using quantum superposition/entanglement and transmitting information in quantum states , a communication system can be implemented which can detect eavesdropping. • If the level of eavesdropping is below threshold , a key is produced guarantying the secure communication otherwise no secure key is possible and communication is aborted
  • 13. BB84 Communication Protocol ● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. ● It is the first quantum cryptography protocol ● Use Photon polarization ● four different non-orthogonal quantum states via a quantum channel to transmit the qubits ● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell can be used too. ● The polarization basis is the mapping we decide to use for a particular state
  • 14.
  • 15.
  • 16. ● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the horizontal and -45 o polarisations to encode the 1" ● Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures ● Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results ● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent ● these compatible bits are used for the shared key
  • 17. BB84 with eavesdropping • If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements. • In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons. • As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob.` • The photon states cannot be cloned (non-clone ability). • Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
  • 18. Quantum coin tossing ➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983 ➔ Two unknown party communicate without third party
  • 19. Quantum coin tossing ( cont>._)
  • 20. Coin Tossing (Cont>._) ● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) . ● Use the polarization and send to Bob ● Bob use polarizer for each bit ● Two tables Rectilinear and diagonal photon table ● Polarizer can loss some photons ● Bob Make his guess ● Alice says if bob wins and tell her basis and ● Send entire bit sequece over classical channel ● Bob verify no cheating by providing his tables
  • 21. Current Arguments QKD is not Public key Cryptography Eve can sabotage quantum channel to force Alice and Bob use classical channel Expensive for longer keys

Notes de l'éditeur

  1. “the coding and decoding of secret messages.” The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them Cryptography – Art of creating and using Cryptosystems Cryptanalysis – Art of breaking Cryptosystems Cryptology – study of Cryptography and Cryptosystems
  2. based on a mixture of guesswork and mathematics relies heavily on the complexity of factoring integers To prove the computation security of public key cryptosystem
  3. Via quantum channel to transmit the bits of Alice's random key
  4. In a Quantum State particle can achieve a “Superposition” – Its Exist in multiple ways simultaneously
  5. It's impossible to know both an object's position and velocity -- at the same time. Through the use of polarization filters, we can force the photon to take one state or another -- or polarize it.
  6. due to non-cloning algorithm.
  7. • We will only discuss BB84 here.
  8. • Unique property of quantum cryptography is the ability of two communicating users to detect the presence of third party trying to gain knowledge of the key.
  9. Let us suppose she uses the vertical and the +45 o polarisations for encoding the \0" and the horizontal and -45 o polarisations to encode the \1" bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures (Fig. 1 and Table I). The probability of using the wrong analyzer and therefore obtaining a random result is 50%
  10. horizontal and -45 o polarisations to encode the \1" Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent these compatible bits are used for the shared key
  11. come to agree on a winner and a loser in such a way that each party has exactly 50 percent chance of winning
  12. Alice choose random basis ( Rectilinear ) and sequence of random bits ( 1000 should be enough ) . Use the polarization and send to Bob Bob use polarizer for each bit Two tables Rectiliear and diagonal photon table Polarizer can loss some photons Bob Make his guess Alice says if bob wins and tell her basis and Send entire bit sequece over classical channel Bob verify no cheating by providing his tables Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put. Bob to cheat - Bob would need to guess Alice’s basis with probability greater than 1 / 2.
  13. Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put.