0% found this document useful (0 votes)
8 views

Quantum Cryptography

Uploaded by

Akash Deep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Quantum Cryptography

Uploaded by

Akash Deep
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

QUANTUM

CRYPTOGRAPHY
Classical Cryptography V/S
Quantum Cryptography
Quantum Key Distribution
(QKD))

• Sarthak Likhwar (2021PH10827)


• Deepak Panwar (2023PHA2032)
CLASSICAL
CRYPTOGRAPHY
Cryptography is the process of hiding information and it
manages the secret knowledge by encrypting the plain
text message through the translation of it to an
unintelligible message.
Classical Cryptography uses the process of mathematical
science operations used to encrypt and decrypt the data
in secret communications.
Two main types of cryptography in use today:
• Symmetric or secret
key cryptography
• Asymmetric or public
key cryptography
CLASSICAL CRYPTOGRAPHY
Symmetric cryptography are known as secret key
material or private key cryptosystem. These ciphers are
depending upon the necessity of single key for both
encode and decode.
Asymmetric cryptography involve the use of different
keys for encryption and decryption. They use one key to
encode a message and a different key to decode it. The
complications in the distribution of asymmetric keys
were solved using mathematical formulations.
Some crypto-systems directly affect their breakthroughs
and it’s difficult to solve them using mathematical
problems in current computers due to the large number
of computations. Instead of that, it can be solved
theoretically using quantum computers where the
transformer process is controlled by data key. If their
channels are threatened, the cipher text of unsafe
channel would need to appropriate the key so that the
attacker needs to be skilled to acquire its indigenous
data.
QUANTUM CRYPTOGRAPHY
The foundational bearing of quantum cryptography is the smallest particles of the
system. Here, the secret communications are essentially sharing their keys in the
photons to interact with each other in a system through the Ethernet.
Quantum cryptography shows that quantum mechanics are providing facilities to
enhance the computational ability of tasks that are accessed in parallel computations.
The speed of retrieval is very fast in the quantum computing with quantum
communication. On the other hand, the conventional communication methods are
also sufficient for handling the security in other applications.
It constructs a quantum channel to require pair of polarization of photons they are the
two types of polarization are rectilinear and diagonal. In rectilinear, there are two
orientations namely horizontal orientation and vertical orientation whereas the
diagonals are around 45 and 135 degrees of orientation in a polarized photon.
QUANTUM CRYPTOGRAPHY
The two famous protocols proposed here are
BB84(Charles Bennett and Gilles Brassard 1984) and
B92 protocol (Bennet 1992).
Once Gracie has generated enough key material to
carry out the encryption, she must arrange for Jack
to receive a copy of the key without the
eavesdropper able to obtain knowledge of it. The
quantum cryptography is generated in sequence of
random numbers to be polarized in the particles. The
sender and receiver are communicating in encrypted
form by converting from plaintext to cipher text and
also directions are rotated in rectilinear and diagonal.
QKD-Simulation &
Characterizations
(Using BB84 PROTOCOL)
• WHAT PAPER WANTS TO DO: Holistic simulation of QKD
with various configurations (noise level, strength of initial
qubits & attack influence). BB84 preferred because of
features- higher bit rate(~6Mbps), secured upto 140km,
resistance against PNS & MITM attacks.
• BASIC CONCEPT: ->BB84 based on photon polarization.-
> 2 processes involved- Transmission & Negotiation.
• EXPERIMENTATION: ->Setup: 2 Computers with static IP
where Core i5 (4.8 GHz) processor & 8 GB RAM for
Master(Alice) & core i3(2.4GHz) processor & 4GB for
Slave(Bob).
• PHASES OF PROTOCOL:
->RK->EE ( If Er>Et, Proceed; else Abort negotiation)->KR->PA

• RESULTS:
Without Attack: ->Noise level-0.5GHz. Initial qubit-(5k-20k) ->5000
qubits deployed->2900 remained after RK->310 left after PA which is
final key. QBER b/w initial qubits and RK extraction is 26.1% implying
7% of key obtained (after PA).
With Attack: ->Noise level-0.5GHz, Attack effect-0.5GHz. Key
provided is same as above. QBER b/w initial qubits and RK extraction is
54% implying 3% of key obtained (after PA).

• Inferences:
->Unexpected noise, attack intrusion and key distillation phases, such
factors makes loss of bits beyond Authentication cost.
-> Any change in configuration levels directly impact length of secret
ke at time of generation (after PA).
SATELLITE TO
GROUND QKD
• China used 'Micus' satellite for QKD & other quantum
experiments whose orbital altitude was about 500 km. Decoy
state QKD with polarization encoding was established with KHz
key rate.
• Challenges of Space: Various factors contribute to channel loss-
Beam diffraction, pointing error(<3dB), atmospheric
turbulence & absorption (~3-8dB). Diffraction and abberations->
taken care of optimizing telescopic lens parameters (Aperture,
focal length, etc). Temporal & spectral filtering used for
background noise suppression.
• EXPERIMENTATION: Decoy state BB84 protocol used for QKD
using WCP. Several decoy states with one single state deployed
having multiple intensity levels(here 3-high,moderate and zero).
8 fiber based LD used-4 for signal, 4 for decoy states.
->Light sent to BB84 module(-> prepares photons as per basis).
RF channel used for classical communication.
• OBSERVATION: Data analyzed for distance 645km(min). Ground
station collected3,551,136 detections & 1,671,072 shifted keys
obtained. Rate decreases from 12kbit/s to 1 kbit/s at 1200km.
Fluctuations increases in direct overhead case.
• EC & PA performed. QBER~1.1%. Same analysis performed for
23 days for different distances b/w satellite & ground station.
QBER remained ~1-3% only.
• COMPARISON WITH CONVENTIONAL FIBER BASED: For
fiber based QKD over 1200km using perfect 10GHz SPS & ideal
detectors with no dark current, transmission through them
would result in 1 bit shifted key over '6 million years'.
• INFERENCES: Satellite based QKD shows faster shifted key
transmission (gap of 10^20) at larger distances. Shortcomings-
limited coverage area & amount of time spent within range of
ground station.
THANK YOU

You might also like