switch from traditional to modern cryptography
DESCRIPTION
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYTRANSCRIPT
![Page 1: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/1.jpg)
BY:
PRASOON SRIVASTAVA
HIMANSHU SHEKHAR
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
![Page 2: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/2.jpg)
FOUNDATION
• A message is Plaintext
• The process of disguising a message in such a way as to hide its substance is Encryption.
• An encrypted message is Cipher text
• The process of turning cipher text back into plaintext is Decryption.
![Page 3: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/3.jpg)
CATEGERIZATION OF CIPHER
1. Symmetric Key Algorithm
![Page 4: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/4.jpg)
2.Asymmetric key algorithm
![Page 5: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/5.jpg)
ECB Mode of encryption
The basic block diagram ECB encryption techniqueencrypt_bi.m
![Page 6: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/6.jpg)
OFB Mode of encryption
The basic block diagram OFB encryption technique encrypt_bi_ofb.m
![Page 7: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/7.jpg)
TRADITIONAL CRYPTOGRAPHY
• The problem with public-key cryptology is that it's based on the staggering size of the numbers created by the combination of the key and the algorithm used to encode the message.
• The problem with Private key algorithm is that there's almost always a place for an unwanted third party to listen in and gain information the users don't want that person to have.
![Page 8: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/8.jpg)
ONE OF THE GREAT CHALLENGES OF CRYPTOLOGY
To Keep Unwanted Parties Or Eavesdroppers From Learning Of Sensitive Information.
And the solution is “QUANTUM CRYPTOLOGY”
![Page 9: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/9.jpg)
QUANTUM CRYPTOLOGY
Quantum physics is a branch of science that deals with discrete, indivisible units of energy called quanta as described by the Quantum Theory. There are five main ideas represented in Quantum Theory:
1. Energy is not continuous, but comes in small but discrete units.
2. The elementary particles behave both like particles and like waves.
3. The movement of these particles is inherently random.
4. It is physically impossible to know both the position and the momentum of a particle at the same time. The more precisely one is known, the less precise the measurement of the other is.
5. The atomic world is nothing like the world we live in.
![Page 10: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/10.jpg)
QUANTUM CRYPTOLOGY BASICS
1.Quantum cryptography uses photons to transmit a key
2. Each type of a photon's spin represents one piece of information -- usually a 1 or a 0, for binary code
3.Polarize them through either the X or the + filters, so that each polarized photon has one of four possible states: (|), (--), (/) or ( ).
![Page 11: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/11.jpg)
![Page 12: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/12.jpg)
QUANTUM CRYPTOLOGY WORKING
1. Alice sends Bob her photons using an LED, so that each polarized photon has one of four possible states: (|), (--), (/) or ( ).
2. As Bob receives these photons, he decides whether to measure each with either his + or X filter -- he can't use both filters together.
3. After the entire transmission, Bob and Alice have a non-encrypted discussion about the transmission.
4. Bob: Plus Alice: Correct
5. Bob: Plus Alice: Incorrect
6. Bob: X Alice: Correct
7. A third party listening in on their conversation can't determine what the actual photon sequence is.
![Page 13: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/13.jpg)
REALIZATATION OF QUANTUM CRYPTOLOGY USING MATLAB1.Here we will realize our “X” and “+” filter using following table.
“+”table “X” table
2. Filter selection:
a) By LFSR
b) Simple random sequence which will be retained by the sender.
11
10
01
00
00
01
10
11
![Page 14: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/14.jpg)
Our message: “lovely professional university”
• Its symbol output: Transmitted Data “Few binary sequence”
• Received Data Sequence:
Binary data Sequence
01 10 11 00 01 10 11 11 01 11
Symbol Transmitted
2 0 3 1 0 2 1 1 1 1
Limiter Used + + X X X X + + X +
Received Sequence 2 0 3 1 0 2 1 1 1 1
Predicted Limiter X + + + X X + X + +
Received Symbol 10 10 00 11 01 10 11 00 10 11
quant_decode.m
![Page 15: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/15.jpg)
Table representing the asking process:
• W- Wrong R- Right
Hence, Bob Gets information about the choice of filter and corrects himself for the wrong one (either discards it and ask for retransmission, or makes a guess).
Knowledge of changed sequence
If the choice of filter used is correct but the data matched for parity is found wrong, then the receiver gets to know that the data sequence has been tampered. Hence, he can stop the transmission further knowing that the communication channel is being tapped.
Bob Replies for his choice of filter
X + + + X X + X + +
Response W R W W R R R W W R
![Page 16: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/16.jpg)
COMPANIES IN THIS FIELD
![Page 17: SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY](https://reader033.vdocuments.us/reader033/viewer/2022061223/54c5de9e4a79598a118b45c9/html5/thumbnails/17.jpg)