Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of quantum cryptography, a secure communication method based on quantum mechanics principles. It covers the basics of cryptography, limitations of modern cryptosystems, and the advantages and limitations of quantum cryptography. The document also includes a discussion on quantum key distribution and examples of how it works.
Typology: Lecture notes
1 / 22
By Roshan Pawar AC- Under Supervision of Dr. Shweta Jain Under Supervision of Dr. Dhirendra Pratap Singh
2017-
(^) It is used to secure communication by protecting the sensitive data and provides confidentiality and integrity of messages. (^) Messages are made secret by transforming them from “plain-text” into “cipher-text”. (^) There are two types of cryptography
Limitations of Modern Cryptosystems
(^) Rather than depending on the complexity of factoring large numbers, quantum cryptography is based on the fundamental and unchanging principles of quantum mechanics. (^) In fact, quantum cryptography rests on two principles of quantum mechanics:
(^) Certain pairs of physical properties are related in such a way that measuring one property prevents the observer from knowing the value of the other. (^) The photon polarization principle describes how light photons can be oriented or polarized in specific directions. Moreover, a photon filter with the correct polarization can only detect a polarized photon or else the photon will be destroyed.
(^) In Quantum cryptography ,there are two channels,
(^) Light waves are propagated as discrete quanta called, photons. They are massless and have energy, momentum and angular momentum called spins. (^) Spin carries the polarization. (^) If the sender and receiver using the same polarizer, then match occurred and that bit value become one of the bit of the key.
(^) This example includes a sender, “Alice”, a receiver, “Bob”, and a malicious eavesdropper, “Eve”. (^) Alice begins by sending a message to Bob using a photon gun to send a stream of photons randomly chosen in one of four polarizations that correspond to vertical, horizontal or diagonal in opposing directions (0,45,90 or 135 degrees). (^) For each individual photon, Bob will randomly choose a filter and use a photon receiver to count and measure the polarization which is either rectilinear (0 or 90 degrees) or diagonal (45 or 135 degrees), and keep a log of the results.
(^) While a portion of the stream of photons will disintegrate over the distance of the link, only a predetermined portion is required to build a key sequence. (^) Bob will inform Alice to the type of measurement made and which measurements were of the correct type without mentioning the actual results. (^) The photons that were incorrectly measured will be discarded, while the correctly measured photons are translated into bits based on their polarization. These photons are used to form the basis of a key for sending encrypted information.
(^) If this malicious attacker, named Eve, tries to eavesdrop, she too must also randomly select either a rectilinear or diagonal filter to measure each of Alice’s photons. (^) Hence, Eve will have an equal chance of selecting the right and wrong filter, and will not be able to confirm with Alice the type of filter used. (^) Even if Eve is able to successfully eavesdrop while Bob confirms with Alice the protons he received, this information will be of little use to Eve unless she knows the correct polarization of each particular photon.
(^) Point to Point links and Denial of Service: X and Y have to be at each end of it, with their photon sources and detectors. The point-to-point nature of QKD restricts potential growth, and gives rise to the possibility of a denial-of- service attack: if Z can’t obtain key information, then cutting the physical link will mean X and Y can’t either, which might serve Z’s purposes just as well. (^) Key Distribution Rate : The length of the quantum channel also has an effect on the achievable rate of key distribution. The rate at which key material can be sent decreases exponentially with respect to distance, and is regarded as another limiting factor in the usability of QKD systems. Limitations of Quantum Cryptography
(^) Quantum cryptography ensure secure communication by providing security based on the fundamental law of physics, instead of the current state of mathematical algorithms or computing technology. (^) Unlike classical encryption algorithm quantum cryptography does not depend factoring large integers into primes but on the fundamental principles of quantum physics. (^) Quantum cryptography is more secure, because an intruder is not able to replicate the photon to recreate the key