You are on page 1of 5

Good morning everyone,I utkarsh verma standing in front of you giving presentation

on the topic-quantum cryptology .

Anyone who is not shocked by quantum theory has not


understood it.
-Niels Bohr
Quantum theory remains as shocking today as it was when Bohr first proposed the
quantum theory for the atom early in the last century. The notion that very small
things, such as atoms and molecules, do not behave in the same way as
macroscopic matter was then, and remains today, nearly incomprehensible to the
human mind. We rely on experience and observation to develop our intuition, and
most of us have never observed the behavior of individual atomic or subatomic
particles.
But a few have explored the world of the very small. And among those few, a
handful of visionaries have been able to fathom ways to use the discontinuous
(quantum) behavior of these small particles to our advantage. Quantum
cryptography is one example of applying a deep understanding of quantum physics
to create a novel technology of potentially enormous significance.

Quantum cryptologyIntroduction

No matter how smart an algorithm is, soon or later


someone will outsmart it and break it.
Optical communications and cryptography have entered the realm of science and
mathematics, especially during the World War II for the advent of electromagnetic
wave transmission that would reach both friendly and foe antennas.
Cryptography is the science of obfuscating messages so that only an intended
recipient can read it, and no one else can. We know that in the English language
different letters appear with different frequencies. The letter E appears much more
often than the letter X. Thus, by carefully analysing the frequencies of different
letters, we can soon figure out what the substitution is. This is called cryptanalysis.
During World War II the Nazis used the Enigma machine to encrypt their
communications. This was famously cracked by Alan Turing, tipping the balance in
the war.
In the last ten years, the Internet has enjoyed tremendous success connecting a
large number of households and businesses with each other. This has created
enormous economic possibilities. However, this economic potential can only be fully
realized if the need for secure (i.e., safe against eavesdropping) transmission of
data over the inherently insecure and open Internet can be satisfied.

According to the Merriam-Webster Dictionary the term cryptography can mean


secret writing, the enciphering and deciphering of messages.
Quantum cryptography was first proposed in 1970 by Wiesner in a paper that
remained unpublished until 1983 and by Bennett and Brassard in 1984 .It
constitutes the first application of the field of quantum information theory which
itself is founded on the fundamental axioms of quantum physics. Quantum
cryptography provides a secure protocol to exchange cryptographic keys. This
protocol is called quantum key distribution or quantum key exchange.
Light waves are propagated as discrete quanta called photons.They are massless
and have energy, momentum and angular momentum called spin.Spin carries the
polarization
Photons have an intrinsic property called polarization. A photon can either be
polarized perpendicular or circular to its direction of motion.
Quantum cryptography obtains its fundamental security from the fact that each
qubit is carried by a single photon, and each photon will be altered as soon as it is
read
The DARPA Quantum Network - World's First Quantum
Cryptographic Network
Under DARPA sponsorship, and together with the academic colleagues of Harvard
University and Boston University, BBN Technologies has recently built and begun to
operate the world's first Quantum Key Distribution (QKD) network which employs
24x7 quantum cryptography to provide unprecedented levels of security for
standard Internet traffic flows such as web-browsing, e-commerce, and streaming
video.
The DARPA Quantum Network became fully operational on October 23, 2003 in
BBN's laboratories.
The principles states the use of lasers and photo detectors, through which light is
sent, in a manner in which eavesdropping is always detectable, through either fiber
optic cable or the atmosphere to distribute cryptographic keys that are used to
scramble (encrypt) and de-scramble (decrypt) a message. The DARPA Quantum
Network created an extremely secure, highly robust network protected by quantum
cryptography,.
.

Types of Cryptographic Algorithms


The two types of cryptographic algorithms that I will briefly discuss in this section
are:

Symmetric key encryption uses the same cryptographic algorithm and the same
key to encipher and decipher messages symmetric key encryption uses the same
key repeatedly to encipher and decipher messages. This makes it inherently less
secure.
Asymmetric key encryption is also known as public key encryption. As the name
implies, it requires two different but mathematically related keys, one to encipher a
message and the other corresponding key to decipher the message. Since one of
the keys is known publicly, it is called the public key. The other key has to be kept
private with one or the other party to the secure communication.

How It Works in Theory


In classical theory, a binary system is in one of two states, logic 1 or logic 0.
However, quantum mechanic theory predicts that a system may be in a
superposition of both states; that is, at logic 1, logic 0 and also between the two
states (the superposition of the two) as a result of uncertainty in the system. Based
on this, quantum bit that defines not only the two binary eigenstates 0 and 1
but also the superposition of the two is known as qubit. Qubits may represent the
two spin eigenstates of electrons, +1/2 and -1/2, or the polarization states or any
other quantized property of photons .

How It Works in Practice


Recently, over longer distances, fiber optic cables with incredibly pure optic
properties have successfully transmitted photon bits up to 60 kilometers. Beyond
that, BERs (bit error rates) caused by a combination of the Heisenberg Uncertainty
Principle and microscopic impurities in the fiber make the system unworkable. Some
research has seen successful transmission through the air, but
this has been over short distances in ideal weather conditions

Why do we need quantum cryptography?


The last two decades the exponential spread of the Internet, which was not
designed with robust security features in mind, opened the appetite of bad actors
for invading the data network with destructive results. I list only a couple to make
the point:
1)The post 9/11/2001 cyber attack that is known as Code Red infected 150,000
computers in just 14 hours and two months later the attack NIMDA infected
86,000 computers.
Nimda is a computer worm, also a file infector quickly spread. It has become the
Internets most widespread virus/worm within 22 minutes.

The worm was released on September 18, 2001 exactly one week after the attacks
on the World Trade Center and Pentagon, Nimda affected mainly windows.
2)December 2010 - The Pakistan Cyber Army hacked into the website of India's
Central Bureau of Investigation.
3)Hackers orchestrated multiple breaches of Sony's PlayStation Network knocking
it offline for 24 days and costing the company an estimated $171 million. These
reports and others have raised a serious concern by government and industry that
have placed network security on high national priority and an Internet Security
Alliance was formed.
To achieve perfect secrecy, the key must be at least as long as the message and
never reused -- i.e. Vernam ciphers must be employed. In 1917 during the First
World War the American scientist Gilbert Vernam was given the task of inventing an
encryption method the Germans could not break by AT&T.(American multinational
telecommunications) His encryption scheme is unbreakable to this day.
For example, Assumes that it is relatively easy to multiply two large prime numbers
to get their product, but quite hard to factor that product into the two original
primes.

Vulnerabilities and weaknesses of quantum cryptography


1)A very long random bit sequence is required to warranty a good encryption key.
2) There is no mechanism to confirm that the key has been correctly constructed
and that the encrypted message has been correctly received and decrypted.
3)An eavesdropper may easily attack the transmitted polarization states on
purpose. So far, the focus in QKD
has been to prevent eavesdropping. However, it is equally important to prevent or
countermeasure attacks.
4)The security of the key during key generation cannot be absolutely guaranteed.
5) To generate single photons, however, turns out to be difficult to
accomplish.Todays implementations therefore rely on faint laser pulses for which
the probability of sending two photons at the same time is known and small.
6) Quantum repeaters-Due to detector noise and fiber loss, the range of current
quantum key distribution systems is limited to 40-60miles Traditional repeaters to
increase this range cannot be used because they would perturb the polarization
state of the photons.
7)Low transmission rate-Here the transmission rate is defined as the number of
corrected secret bits
that can be transmitted per second. Transmission rates on the order of Gigahertz
that are common with todays fiber-optic communication systems are not attainable

with current quantum key distribution technology . This limits the use of a QKD onetime pad to all but the most confidential transmissions.

It is my belief that the only thing that might stand in the way of an eventual
widespread adoption of quantum cryptography is its apparent strength. Since, if
properly implemented, it is inherently unbreakable, governmental security agencies
might want to restrict its use.There is no doubt that there are still quite difficult
technical problems to overcome, such as its limited range and low transmission
rate, before it will find widespread use in todays network infrastructure.
Hoping that this method will find its applications without any limitations.
THANK YOU

You might also like