quantum cryptography
TRANSCRIPT
![Page 1: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/1.jpg)
QUANTUM CRYPTOGRAPHY
&QUANTUM KEY DISTRIBUTION
![Page 2: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/2.jpg)
What Is Cryptography
Secret message
![Page 3: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/3.jpg)
Importance & Applications
![Page 4: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/4.jpg)
Bob Alice
Eavesdropper
Some keywords
![Page 5: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/5.jpg)
Encryption
Decryption
Encryption Key
Decryption Key
![Page 6: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/6.jpg)
Plaintext
![Page 7: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/7.jpg)
Parts, Embodied In Cryptography
![Page 8: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/8.jpg)
To setup a useful cryptography system, the most important issues you would encounter is the security.
Troubles With Cryptography
Breaking The LOCK
Stealing the information within Key’s exchanging
![Page 9: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/9.jpg)
Quantum Mechanic Parameters
SU
P
E
R
P
OS
I
T
I
O
N Probabilistic
![Page 10: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/10.jpg)
PO
L
A
R
IZ
A
T
I
O
N
POLARIZATION
![Page 11: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/11.jpg)
A simple example of superposition
α
In Classic in the simplest state
0 1
up down
openclose OR
OR
OR
0 , open
1 , close
![Page 12: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/12.jpg)
So what is the difference between the classical superposition and quantum superposition
αAfter
measurement OR
With probability of
With probability of
![Page 13: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/13.jpg)
Classical CryptographyVs.
Quantum Cryptography
DONE.
![Page 14: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/14.jpg)
Classical CryptographyVs.
Quantum CryptographyS
U
P
E
R
P
OS
I
T
I
O
NS
U
P
E
R
POS
I
T
I
O
N
S UP
E
R
POS
I
T
I
ON
S UP
E
R
POS
I
T
I
ON
S UPER
POS
ITIO
N
S UPER
POSITIO
N
SU
P
E
R
P
OS
I
T
I
O
N
I’m Confused
![Page 15: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/15.jpg)
A Simple Quantum Key DistributionProtocol
Charles H.BennetGilles Brassard
1984
BB84
Quantum Cryptography: Public Key Distribution and Coin TossingPublished in physical review
![Page 16: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/16.jpg)
A Byte of message
11001110
KEY Cipher text
A SIMPLE SAMPLE OF KEY AND ITS FUNCTION
Summation rule1+1=01+0=10+0=00+1=1
![Page 17: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/17.jpg)
Quantum bit
α
Polarization of a single photon
Transmition probability
Absorptionprobability
Filter apparatus
|0>
|1>
![Page 18: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/18.jpg)
R ≡ Rectilinear Base
D ≡Diagonal Base
R
R
D D
|1>
|0>
|-> |+>
![Page 19: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/19.jpg)
Translating Quantum Bits Into Classic Bits
0
1
Polarization BasesAnd Quantum Bits
Classical Bits
0
1|0>
|+>|->
|1>
![Page 20: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/20.jpg)
R |0> 0
R |1> 1
D |+> 0
D |-> 1
![Page 21: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/21.jpg)
Bob chooses a random bit string and a random
sequence of polarization bases
(mix of Rectilinear and Diagonal)
Alice receives the photons and decides randomly for
each photon, independently of Bob, whether to measure the polarization of photon in Rectilinear or Diagonal bases
![Page 22: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/22.jpg)
0
1
If absorbed 1If transmitted 0
If absorbed 0If transmitted 1
Will absorbed 0If absorbed
If transmitted
0
1
Will transmitted
1If absorbed
If transmitted
0
1
![Page 23: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/23.jpg)
Quantum transmission 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Bob's random bit 0 1 1 0 1 1 0 0 1 0 1 1 0 0 1
Bob's random bases D R D R R R R R D D R D D D R
Bob's Polarization
Alice random bases R D D R R D D R D R D D D D R
Received bits by Alice 1 1 1 0 0 0 1 1 1 0 1
Public Discussion
Alice reports bases of received bases R D R D D R R D D D R
Bob says which bases were correct OK OK OK OK OK OK
Presumably shared information 1 1 0 1 0 1
Alice reveals some key bits at random 1 0
Bob confirms them OK OK
Outcome
Remaining shared information 1 0 1 1
![Page 24: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/24.jpg)
This information are secure with extremely high probability
So this information are suitable for KEY ; As the result the
KEY has Shared securely
Remaining shared information 1 0 1 1
1 0 1 1
OUTCOME
![Page 25: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/25.jpg)
Conclusion
The protocol is high secure and prevents Information from being Stolen and Hacked by EAVESDROPPER.
Although this protocol is theoretical, it’s not such out of reach to remain in just theories.
Although this protocol is secure enough but cannot prevent from being suppressed and excessively perturbed by EAVESDROPPER or INTRUDER.
![Page 26: Quantum Cryptography](https://reader030.vdocuments.us/reader030/viewer/2022032617/55a96d571a28ab30508b459f/html5/thumbnails/26.jpg)