SlideShare a Scribd company logo
Quantum Cryptography Presented By Sukhdeep Kaur Roll No. 5266 BCA Final
Quantum Cryptography
INTRODUCTION Quantum cryptography , or  quantum key distribution  (QKD), uses  quantum mechanics  to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a  key  to encrypt and decrypt messages
FLOW OF SEMINAR HISTORY APPROACHES INFORMATION RECONCILATION PRIVACY AMPLIFICATION ADVANTAGES ATTACKS FUTURE SCOPE (PROSPECTS) QUANTUM CRYPTOGRAPHY RESEARCH GROUP COMPANIES WITH RESEARCH PROGRAM
TERMS PHOTON  :--It is the elementry particle responsible for electromagnetic phenomena.It is the carrier of electromagnetic radiations.  QUANTUM ENTANGLEMENT  :--It is a physical resource like energy.It can be measured,transformed and purified.
HISTORY In the early 1970  Stephen Wiesner , firstly introduced the concept of quantum conjugate coding in New York.  His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78-88, 1983).  A decade later,  Charles H. Bennett , of the IBM  Thomas J. Watson Research Center , and  Gilles Brassard , of the Université de Montréal, proposed a method for secure communication based on Wiesner’s “conjugate observables”. In 1990,  Artur Ekert , then a Ph.D. student  of Oxford   University , developed a different approach to quantum cryptography known as quantum entanglement.
APPROACHES Quantum cryptographic follows two type of Quantum cryptographic protocol.   Polarized photons  Entangled photons
INFORMATION RECONCILATION Information reconciliation  is a form of error correction carried out between Alice and Bob's keys,(to ensure both keys are identical). It is conducted over the public channel. It is vital to minimise the information sent about each key( as this can be read by Eve).  A common protocol used is  cascade protocol , proposed in 1994
PRIVACY AMPLIFICATION Privacy Amplification  is a method for reducing (and effectively eliminating) Eve's partial information about Alice and Bob's key.  This partial information could have been gained both by eavesdropping on the quantum channel during key transmission (thus introducing detectable errors), and on the public channel during information reconciliation (where it is assumed Eve gains all possible parity information).  Privacy amplification uses Alice and Bob's key to produce a new, shorter key, in such a way that Eve has only negligible information about the new key.
ADVANTAGES IT MAKES POSSIBLE TO PERFORM A 2-ION OPERATION ON IONS THAT ARE NOT CLOSE TO ONE ANOTHER. IT INCREASES THE COMPUTER’S ERROR THRESHOLD WHICH MEANS COMPUTERS WOULD BE EASIER TO MAKE. STATE OF AN ION CAN BE STORED FOR A LONG TIME. THIS PROCESS IS RELIABLE AND THE STATE THAT HAS BEEN TELEPORTED IS AVAILABLE FOR ANOTHER ROUND OF INFORMATION PROCESSING.
ATTACKS In Quantum Cryptography, traditional  man-in-the-middle attacks  are impossible due to the  Observer Effect .   If Alice and Bob are using an entangled photon system, then it is virtually impossible to hijack these, because creating three entangled photons would decrease the strength of each photon to such a degree that it would be easily detected.
FUTURE SCOPE (PROSPECTS) The experiments suggests transmission to satellites is possible, due to the lower atmospheric density at higher altitudes.  The current commercial systems are aimed mainly at governments and corporations with high security requirements.  Factors preventing wide adoption of quantum cryptography outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols.
QUANTUM CRYPTOGRAPHY RESEARCH GROUP Experimental Quantum Cryptography with Entangled Photons   NIST Quantum Information Networks
COMPANIES WITH RESEARCH PROGRAM Toshiba   HP   IBM   Mitsubishi   NEC   NTT
Thank you
Ad

More Related Content

What's hot (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Himanshu Shekhar
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
Shivangi Saxena
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
Bise Mond
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
NARESHGOTMAL
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
tabrej
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
Fatemeh Ghezelbash
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
Bise Mond
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
NARESHGOTMAL
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
tabrej
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 

Viewers also liked (14)

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Omar Shehab
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
spreedniels
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
Seminar Links
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
ganeshkarthick
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
Alexis Diaz
 
Spooky action from a distance
Spooky action from a distanceSpooky action from a distance
Spooky action from a distance
Eran Sinbar
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Omar Shehab
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
spreedniels
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
Alexis Diaz
 
Spooky action from a distance
Spooky action from a distanceSpooky action from a distance
Spooky action from a distance
Eran Sinbar
 
Ad

Similar to Quantum cryptography (20)

Quantum Cryptography and its Applications
Quantum Cryptography and its ApplicationsQuantum Cryptography and its Applications
Quantum Cryptography and its Applications
bismayabaliarsingh00
 
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptxQuantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
SubhasishKabi2
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
guestbd2263
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
Yi-Hsueh Tsai
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
ijcisjournal
 
Exploring Quantum Cryptography: Next-Generation Security Protocols
Exploring Quantum Cryptography: Next-Generation Security ProtocolsExploring Quantum Cryptography: Next-Generation Security Protocols
Exploring Quantum Cryptography: Next-Generation Security Protocols
GrapesTech Solutions
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
adeel paracha
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
Quantum communication and its applications.pptx
Quantum communication and its applications.pptxQuantum communication and its applications.pptx
Quantum communication and its applications.pptx
hrithikexams
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
XequeMateShannon
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
IJNSA Journal
 
Quantum Cryptography and its Applications
Quantum Cryptography and its ApplicationsQuantum Cryptography and its Applications
Quantum Cryptography and its Applications
bismayabaliarsingh00
 
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptxQuantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
SubhasishKabi2
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
guestbd2263
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
Yi-Hsueh Tsai
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
ijcisjournal
 
Exploring Quantum Cryptography: Next-Generation Security Protocols
Exploring Quantum Cryptography: Next-Generation Security ProtocolsExploring Quantum Cryptography: Next-Generation Security Protocols
Exploring Quantum Cryptography: Next-Generation Security Protocols
GrapesTech Solutions
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfPHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdf
adeel paracha
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
Quantum communication and its applications.pptx
Quantum communication and its applications.pptxQuantum communication and its applications.pptx
Quantum communication and its applications.pptx
hrithikexams
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
The Security of Practical Quantum Key Distribution
 The Security of Practical Quantum Key Distribution The Security of Practical Quantum Key Distribution
The Security of Practical Quantum Key Distribution
XequeMateShannon
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
IJNSA Journal
 
Ad

Recently uploaded (20)

2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 

Quantum cryptography

  • 1. Quantum Cryptography Presented By Sukhdeep Kaur Roll No. 5266 BCA Final
  • 3. INTRODUCTION Quantum cryptography , or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages
  • 4. FLOW OF SEMINAR HISTORY APPROACHES INFORMATION RECONCILATION PRIVACY AMPLIFICATION ADVANTAGES ATTACKS FUTURE SCOPE (PROSPECTS) QUANTUM CRYPTOGRAPHY RESEARCH GROUP COMPANIES WITH RESEARCH PROGRAM
  • 5. TERMS PHOTON :--It is the elementry particle responsible for electromagnetic phenomena.It is the carrier of electromagnetic radiations. QUANTUM ENTANGLEMENT :--It is a physical resource like energy.It can be measured,transformed and purified.
  • 6. HISTORY In the early 1970 Stephen Wiesner , firstly introduced the concept of quantum conjugate coding in New York. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78-88, 1983). A decade later, Charles H. Bennett , of the IBM Thomas J. Watson Research Center , and Gilles Brassard , of the Université de Montréal, proposed a method for secure communication based on Wiesner’s “conjugate observables”. In 1990, Artur Ekert , then a Ph.D. student of Oxford University , developed a different approach to quantum cryptography known as quantum entanglement.
  • 7. APPROACHES Quantum cryptographic follows two type of Quantum cryptographic protocol. Polarized photons Entangled photons
  • 8. INFORMATION RECONCILATION Information reconciliation is a form of error correction carried out between Alice and Bob's keys,(to ensure both keys are identical). It is conducted over the public channel. It is vital to minimise the information sent about each key( as this can be read by Eve). A common protocol used is cascade protocol , proposed in 1994
  • 9. PRIVACY AMPLIFICATION Privacy Amplification is a method for reducing (and effectively eliminating) Eve's partial information about Alice and Bob's key. This partial information could have been gained both by eavesdropping on the quantum channel during key transmission (thus introducing detectable errors), and on the public channel during information reconciliation (where it is assumed Eve gains all possible parity information). Privacy amplification uses Alice and Bob's key to produce a new, shorter key, in such a way that Eve has only negligible information about the new key.
  • 10. ADVANTAGES IT MAKES POSSIBLE TO PERFORM A 2-ION OPERATION ON IONS THAT ARE NOT CLOSE TO ONE ANOTHER. IT INCREASES THE COMPUTER’S ERROR THRESHOLD WHICH MEANS COMPUTERS WOULD BE EASIER TO MAKE. STATE OF AN ION CAN BE STORED FOR A LONG TIME. THIS PROCESS IS RELIABLE AND THE STATE THAT HAS BEEN TELEPORTED IS AVAILABLE FOR ANOTHER ROUND OF INFORMATION PROCESSING.
  • 11. ATTACKS In Quantum Cryptography, traditional man-in-the-middle attacks are impossible due to the Observer Effect . If Alice and Bob are using an entangled photon system, then it is virtually impossible to hijack these, because creating three entangled photons would decrease the strength of each photon to such a degree that it would be easily detected.
  • 12. FUTURE SCOPE (PROSPECTS) The experiments suggests transmission to satellites is possible, due to the lower atmospheric density at higher altitudes. The current commercial systems are aimed mainly at governments and corporations with high security requirements. Factors preventing wide adoption of quantum cryptography outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols.
  • 13. QUANTUM CRYPTOGRAPHY RESEARCH GROUP Experimental Quantum Cryptography with Entangled Photons NIST Quantum Information Networks
  • 14. COMPANIES WITH RESEARCH PROGRAM Toshiba HP IBM Mitsubishi NEC NTT
  • 16.