new dawn of security in telecommunications: quantum cryptography
DESCRIPTION
Presented by: Mayssaa El Rifai and Bhagyashri Arun DarunkarTRANSCRIPT
![Page 1: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/1.jpg)
101010000111100……..
New Dawn of Security in Telecommunications: Quantum
Cryptography
Presented By: Mayssaa El Rifai
Bhagyashri Arun Darunkar
University of Oklahoma, Tulsa
![Page 2: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/2.jpg)
101010000111100……..
Introduction: Need for secure communication
*Ref: —Milner, Newsweek, Oct. 10, 20112
![Page 3: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/3.jpg)
101010000111100……..
Timeline of Secure Communication
3
![Page 4: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/4.jpg)
101010000111100……..
Why Quantum Cryptography?
• Quantum Cryptography was first proposed in 1970• The first protocol in quantum cryptography was proposed in a paper published in
1984 by Bennett and Brassard (BB84)• The basics of the quantum cryptography rest on two main principles
The Heisenberg uncertainty principle
The no-cloning theorem
4
![Page 5: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/5.jpg)
101010000111100……..
Protocols
5
![Page 6: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/6.jpg)
101010000111100……..
Limitations of BB’84
6
Single photon requirement Data rate Distance
Limitations
Solution
USE MULTI-PHOTON TOLERANT QUANTUM SECURE PROTOCOL
![Page 7: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/7.jpg)
101010000111100……..
The Three-stage Protocol: Idea
ALICE BOB
ALICE BOB
Information
Information
Information
Information
7
![Page 8: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/8.jpg)
101010000111100……..
The Three-Stage Protocol: Science
Proposed by Dr. Kak in 2006X
UA
X
UB
UA(X)
8
![Page 9: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/9.jpg)
101010000111100……..
The Single-stage protocolAlice and Bob make use of this shared information to form new key by using concept of
braiding
ALICE BOBInformation
Information
Variation in Dr. Kak’s protocol, proposed by James ThomasAssumption Prerequisite
9
![Page 10: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/10.jpg)
101010000111100……..
Summary
10
![Page 11: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/11.jpg)
101010000111100……..
Thank You
Any Questions?
11
![Page 12: New Dawn of Security in Telecommunications: Quantum Cryptography](https://reader036.vdocuments.us/reader036/viewer/2022081603/55757adfd8b42adb7e8b4ba4/html5/thumbnails/12.jpg)
101010000111100……..
Contact DetailsBhagyashri Darunkar Email: [email protected] El Rifai Email: [email protected]
12