You are on page 1of 20

Vidya Bharathi Institute Of Technology

Department of Electronics and Communication Engineering

A Seminar on

QUANTUM CRYPTOGRAPHY
Presented by:
B.Ramya, 08J91A0437.

CRYPTOGRAPHY

PRACTICE AND STUDY OF

HIDING INFORMATION
This is one of the types of cryptography which uses Quantum mechanics for encryption and decryption

Quantum Cryptography

BASIC MODEL OF CRYPTOGRAPHY

PROCESS OF CRYPTOGRAPHY

Plain text Encryption key Key clustering Cipher text Decryption Original message

TERMS

It is the elementary particle responsible for electromagnetic phenomena. It is the carrier of electromagnetic radiations.
PHOTON :

QUANTUM ENTANGLEMENT: It is a physical resource like energy. It can be measured, transformed and purified.

INTRODUCTION

Quantum Cryptography is based on the Physical

properties of photons.

Its nothing but union of cryptography with quantum mechanics.

PKC was proposed by Stephen J.Wiesner in 1970.


Quantum cryptographic schemes developed between 1982 and 1984 and then improved by J. Watson in 1989.

BASIC IDEA

CONSTRUCTION OF QUANTUM CHANNEL


Polarizing filter Sender sends some selected polarizations and receiver measure the polarization. In general polarizing filter absorbs some of photons. Calcite crystal does not absorb any photons which are passing through it.

OPERATION INSIDE CALCITE CRYSTAL

The photon may pass straight through the crystal and if it is Horizontally polarized photon. If the photon is vertically polarized then it shifts its path inside the crystal and travels. When diagonally polarized photons enter the crystal they are re polarized at random.

QUANTUM DATA REPRESENTATION


In quantum computing, standard bits are represented using atoms or photons. Atoms and photons have a spin associated with them. The spin is either up or down Some quantum cryptographic protocols make direct use of a property of qubits, known as Quantum entanglement. A change in the state of one quantum particle will affect the state of other co-related particles

QUANTUM KEY
Quantum information cannot be read unless some information is known in advance about the state in which the information was prepared Any attempt to read and hence copy the data without the required information, disturbs the data in such away as to change its values.

APPROACHES

Quantum cryptographic follows two type of Quantum cryptographic protocol.

Polarized photons Entangled photons

DESCRIPTION OF QUANTUM KEY


This method uses polarised photons as the information carriers. Photons can be polarised to many different angles. This algorithm makes use of 4 different polarisation to achieve secure communication. The four angles of polarisation are 0, 45, 90 and 135 degrees.

EX OF QUANTUM CRYPTOGRAPHY

DIFFERENCE BETWEEN THE NORMAL AND QUANTUM CRYPTOGRAPHY

Uses mathematical methods for encryption and decryption

Uses Quantum physical laws for encryption and decryption

ADVANTAGES

Secure method of communication of the information.

Unbreakable cryptosystem.

Can detect eavesdropping.

DISADVANTAGES

This algorithm is presently available for short distances only.

Cost of quantum equipment is high and the

equipment is huge.

This is infeasible for use in a home environment.

CONCLUSION
The field of Quantum information has surprising insights-both in the foundation of the quantum mechanics and its application to the problem of communication.

REFERENCES
www . hitchhiker's guide to quantum cryptography. www . qcintro files. www . new releases. www . optical processing. www. askjeeves a theoretical ascertain of the quantum cryptography part 1 & part 2. www.wikipedia.com

You might also like