0% found this document useful (0 votes)
58 views4 pages

Quantum Cryptography: Ankit Shukla, Deepak Kumar (3 Year)

The document summarizes quantum cryptography and discusses its advantages over traditional cryptography. Current encryption algorithms introduce potential security issues related to key refresh rates and expansion ratios. Quantum cryptography addresses these issues through the laws of quantum mechanics, making messages secure even if intercepted. It also discusses quantum cryptography protocols like BB84 and challenges like transmission distances that researchers continue working to improve.

Uploaded by

Ankit Shukla
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views4 pages

Quantum Cryptography: Ankit Shukla, Deepak Kumar (3 Year)

The document summarizes quantum cryptography and discusses its advantages over traditional cryptography. Current encryption algorithms introduce potential security issues related to key refresh rates and expansion ratios. Quantum cryptography addresses these issues through the laws of quantum mechanics, making messages secure even if intercepted. It also discusses quantum cryptography protocols like BB84 and challenges like transmission distances that researchers continue working to improve.

Uploaded by

Ankit Shukla
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Quantum Cryptography

Ankit Shukla, Deepak Kumar(3rd year)


Computer Science Department,ABES Engg. College, (Gautam Buddh Technical University)
[email protected] [email protected] Abstract

Threats and attacks to information systems security on digital network environment are growing rapidly, putting pressure on businesses to protect their tangible and intangible assets.It is reported that 75% of surveyed organizations have confronted different network security attacks. For that reason,cryptography is a vital of todays computer and communications networks, protecting everything from business e-mail to bank transactions and internet shopping . But the scholars argue that, the current encryption algorithms based on mathematical model introduce potential security holes related to the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques.These cryptographic techniques are widely used but are not proved to be completely secure, representing one of the main threats to modern network communication systems.For past decade efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics.

explains: It secures the network, as well as protecting and overseeing operations being done. Current encryption algorithms based on mathematical model introduce potential security holes related to the key refresh rate and key expansion ratio. That is the sole reason why modern cryptographic techniques like Quantum Cryptography is introduced. II. DETERMINE THE FACTORS INVOLVED IN A SECURE NETWORK
STRATEGY

Define & enforce policies and procedures Analysis of both internal and external threats Reduce risk across perimeter security, the Internet, intranets, Extranet, and LANs ,Human factors Risk Assessment (Know your weakness) Limit access Achieve security through continuous process Remember physical security III. DETERMINE THE FACTORS INVOLVED IN A SECURE NETWORK
STRATEGY

I. INTRODUCTION Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title

Access Control (Only legitimate traffic) Firewall Management process to security issues Cryptography (Encryption/Decryption) IDS (Intrusion Detection Systems)

IV. UNDERSTAND THE BASICS OF ALGORITHMS AND HOW THEY ARE USED IN MODERN CRYPTOGRAPHY Mathematical functions that work in tandem with a key Same plaintext data encrypts into different ciphertext with different keys Security of data relies on two factors:

Strength of the algorithm Secrecy of the key

Fig. 1 A graph between computing time of encryption algorithm and key length.

V. VULNERABILITIES/WEAKNESS TO THE MODERN/CLASSICAL CRYPTOGRAPHY There are three main problems with encryption schemes. 1) The first is key distribution, which must be in itself, 2) The second is key management, where the number of keys required in a system with a large number of principals does not scale well. 3) Thirdly as computing power increases, and new classical computational techniques are developed, the length of time that a message can be considered secure will decrease, and numerical keys will no longer be able to provide acceptable levels of secure communications. 4) Vulnerable to the progress (supercomputers) and algorithms. in computation

(BB84) as part of research study between physics and information at IBM lab. The quantum system is based on the distribution of single particles or photons, and the value of a classical bit encodes by the polarization of a photon . In fact, the quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system.This means, the polarization of a photon or light particle can only be known at the point when it is measured. Secondly, the photon polarization principle explains how light photons can be polarized in a specific direction. In addition, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to nocloning theorem which was first presented by Wootters and Zurek in 1982. VII. PHOTONS POLARIZATION

A photon has a property called polarization, which is the plane in which the electric field oscillates.We can use photons of different polarizations to represent quantum states. Each of these photons is in a state denoted by one of the four following symbols: , |, /, \ The first two photon states are emitted by a polarizer which is set with a rectilinear orientation and the other two states are emitted by a polarizer which is set with a diagonal orientation. The polarization basis is the mapping we decide to use for a particular state.

5) Vulnerable to future quantum c.omputation protocols. For example: 5.1) Shors Algorithm (Peter Shor): Factoring allows for factoring large numbers on a quantum computer in polynomial time, theoretically breaking RSA encryption. 5.2) While any practical application on Shors algorithm may be decade away, but an experimental proof-ofconcept of Shors algorithm has successfully been achieved .

Rectilinear =0 => state 0

Diagonal =45 => state 0

=90 => state 1 =135=> state 1


VI. UNDERSTANDING OF THE QUANTUM CRYPTOGRAPHY Quantum cryptography concept developed by Charles H. Bennett and Gilles Brassard in 1984

VIII. QKD PROTOCOLS A security protocol is a special protocol designed to ensure security properties are met during communications. There are three main security protocols for QKD: BB84, B92, and Entanglement-Based QKD. IX. BB84 PROTOCOL BB84 was the first security protocol implementing Quantum Key Distribution.It uses the idea of photon polarization. The key consists of bits that will be transmitted as photons. Each bit is encoded with a random polarization basis!

Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob.

Bob tells Alice which basis he used to decode


the same bits.

Where the same basis was used, Alice and Bob


agree on the bits.

XI. BB84 PROTOCOL WITH EVE (IN THE PRESENCE OF EAVESDROPPING) If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bobs measurements. In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement (Error Rate). Eves measurements are bound to affect the states of the photons. As Eve intercepts Alices photons, she has to measure them with a random basis and send new photons to Bob. The photon states cannot be cloned (no-cloning theorem which was first presented by Wootters and Zurek in 1982. Eves presence is always detected: measuring a quantum system irreparably alters its state (The Heisenberg Uncertainty principle) .

X. BB84 PROTOCOL WITH NO EVE (NO EAVESDROPPING) Sender's side: Alice is going to send Bob a random key. She begins with transmitting a random sequence of bits. Bits are encoded with a random basis Receiver's side: Bob receives the photons and must decode them using a random basis. Some of his measurements are correct. Testing bits Alice and Bob talk on the telephone:

[6] [7]

http://www.toshiba-europe.com/research/crl/QIG/ Japan Research Group

[8] http://www.aist.go.jp/aist_e/event/ev2007/ev20071001/e v20071001.html [9] NIST Research Group XII. TECHNICAL CHALLENGES OF QKD AND FUTURE DIRECTION One of the challenges for the researchers, is distance limitation. Currently, quantum key distribution distances are limited to tens of kilometers because of optical amplification destroys the qubit state. Also to develop optical device capable of generating, detecting and guiding single photons; devices that are affordable within a commercial environment . Another issue is the lack of a security certification process or standard for the equipment . Also users need reassurance not only that QKD is theoretically sound, but also that it has been securely implemented by the vendors.
XIII.

[10] http://www.nist.gov/public_affairs/quantum/quantum_in fo_index.html

CONCLUSIONS

Realization of practical quantum information technologies can not be accomplished without involvement of the network research community. The advances in computer processing power and the threat of limitation for todays cryptography systems will remain a driving force in the continued research and development of quantum cryptography.

The technology has the potential to make a valuable contribution to the network security among government, businesses, and academic environment. ACKNOWLEDGMENT REFERENCES MagiQ Technologies, Inc. (USA) www.magiqtech.com IdQuantique (Switzerland) www.idquantique.com NEC (Japan) www.nec.com Research Groups working on QKD at IBM and Toshiba (USA, europe) http://www.research.ibm.com/physicsofinfo/index.htm#

[1] [2] [3] [4] [5]

You might also like