SlideShare a Scribd company logo
QUANTUM CRYPTOGRAPHY
PRESENTED BY
NAME :- BISMAYA BALIARSINGH
REGISTRATION NO. :- 2361020052
BRANCH :- MASTER OF COMPUTER APPLICATIONS
SECTION :- C1
GUIDED BY :- ASST. PROFESSOR ALOK KUMAR PATI
Contents
 Introduction
 Traditional vs Quantum Cryptography
 How Quantum Cryptography works
 Applications of Quantum Cryptography
 Advantages
 Disadvantages
 Future Scopes
 Conclusion
 Bibliography
What is Quantum Cryptography & it’s History❔
 Quantum Cryptography is an effort to allow two users of common
communication channel to create a body of shared and secret information. This
information, which generally takes the form of a random string of bits, can then
be used as a conventional secret key for secure communication.
 The Heisenberg Uncertainty principle and quantum entanglement can be
exploited in as system of secure communication often referred to as “Quantum
Cryptography”.
 Stephen Wiesner wrote “Conjugate Coding ” in the late sixties , then Charles H.
Bennett and Gilles Brassard revived the field in 1982 by combining quantum
process with public key cryptography.
Quantum Cryptography and its Applications
Traditional vs Quantum Cryptography
Traditional
 Traditional cryptography is heavily
based on mathematical theory and
computer science practice,
cryptographic algorithms are designed
around computational assumptions,
making such algorithms hard to break in
practice by any adversary.
Quantum Cryptography
 Quantum cryptography is the science
of exploiting quantum mechanical
properties to perform cryptographic
tasks.
How Quantum Cryptography works ❔
 Quantum cryptography takes advantage of the unique and unusual
behavior of microscopic objects to enable users to securely develop
secret keys as well as to detect eavesdropping.
 Quantum cryptography solves the problems of secret key cryptography
by providing a way for two users who are in different locations to
securely establish a secret key and to detect if eavesdropping has
occurred.
 BB84 Protocol most commonly used QKD protocol.
Qubit and Quantum Physics 🤔
 The most important unit of information in computer
science is the bit. There are two possible values that
can be stored by a bit: the bit is either equal to “0” or
“1”.
 Quantum system with at least two states can serve as
a qubit. For example, the spin of an Atom or the
polarization of a light particle can represent the state
of a qubit.
 Heisenberg’s Uncertainty Principle:
It is possible to encode information into quantum
properties of a photon in such a way that any effort to
monitor them disturbs them in some detectable way.
 Quantum Entanglement:
The entangled particles can not be described by
specifying the states of individual particles and they may
together share information in a form which can not be
accessed in any experiment performed on either of the
particles alone.
Using Quantum Cryptography
 The foundation of quantum cryptography lies in the Heisenberg
uncertainty principle and Polarization of light.
 Basically quantum cryptography is combination of OTP and QKD.
 The most widely used PKC is the RSA(Rivest-shamir-Adleman)
algorithm based on the difficulty of factoring a product of two large
primes.
Polarization of Photons
QKD & OTP
Quantum Key Distribution
 QKD uses quantum mechanics to guarantee secure
communication and tell us all attempts of
eavesdropping.
 QKD is only used to produce and distribute a key,
not to transmit any message data.
 It enables two parties to produce a shared random bit
string known only to them, which can be used as a
key for encryption and decryption.
One Time Pad
 OTP is an encryption technique that can not be
cracked if used correctly.
 The key used in a one-time pad is called a secret key.
Suppose consider three people Alice, Bob and Eve where
Alice is the sender ,Bob is the receiver and Eve is the
eavesdropper.
Advantages
 Unbreakable security.
 Future proof against Quantum Computing Attacks.
 Used to detect eavesdropping in quantum key distribution.
 No need for mathematical assumptions.
 Resistance to Brute-Force Attacks.
 Ideal for highly sensitive communications.
Disadvantages
 Setup is expensive.
 Signal is limited up to approx. 400km-500km.
 No protection against Denial-0f-Service(DoS) attacks.
 Hardware vulnerabilities.
 Integration challenges.
 Lack of standardization.
Future Scopes
 Quantum Internet Development.
 Integration with Post-Quantum Cryptography(PQC).
 Secure Cloud Computing & IoT Protection.
 Quantum Cryptography in Financial Transactions.
 AI and Quantum Cryptography Convergence.
 Standardization and Global Adoption.
Conclusion
 Quantum Cryptography is a major achievement in security engineering.
 Quantum Cryptography is set to revolutionize cybersecurity, but challenges like cost, scalability, and infrastructure
development need to be addressed.
 As it gets implemented it will allow perfectly secure bank transactions, secret discussions for government officials,
and well guarded trade secrets for industry.
Bibliography
 Risk, W.P.;Bethune, D.S. – “Quantum Cryptography – Using Auto compensating Fiber-Optic Interferometers.”
Optics and Photonics News.
 id Quantique- “Quantis - OEM Datasheet.” v1.3, July 2004, http://www.idquantique.com.
 id Quantique- “White Paper – Random Numbers Generation using Quantum.” Version 2.0, August 2004.
 id Quantique- “White Paper – Understanding Quantum Cryptography.” Version 1.0, April 2005.
 Wikipedia community- “Quantum Cryptography.” https://en.m.Wikipedia.org/wiki/Quantum_cryptography
“
”
Thank You 😀
Ad

More Related Content

Similar to Quantum Cryptography and its Applications (20)

Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
vignans institute for management and technology for women
 
What is Quantum Cryptography and Know How Does QKD Work
What is Quantum Cryptography and Know How Does QKD WorkWhat is Quantum Cryptography and Know How Does QKD Work
What is Quantum Cryptography and Know How Does QKD Work
BORNSEC CONSULTING
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
Akshay Shelake
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Martins Okoi
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
Software Guru
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
What is Quantum Cryptography and Know How Does QKD Work
What is Quantum Cryptography and Know How Does QKD WorkWhat is Quantum Cryptography and Know How Does QKD Work
What is Quantum Cryptography and Know How Does QKD Work
BORNSEC CONSULTING
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
Akshay Shelake
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Martins Okoi
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
Software Guru
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 

Recently uploaded (20)

Preparation of Permanent mounts of Parasitic Protozoans.pptx
Preparation of Permanent mounts of Parasitic Protozoans.pptxPreparation of Permanent mounts of Parasitic Protozoans.pptx
Preparation of Permanent mounts of Parasitic Protozoans.pptx
Dr Showkat Ahmad Wani
 
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptxVERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
hipachi8
 
2025 Insilicogen Company Korean Brochure
2025 Insilicogen Company Korean Brochure2025 Insilicogen Company Korean Brochure
2025 Insilicogen Company Korean Brochure
Insilico Gen
 
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Yasasi Abeysinghe
 
Gel Electrophorosis, A Practical Lecture.pptx
Gel Electrophorosis, A Practical Lecture.pptxGel Electrophorosis, A Practical Lecture.pptx
Gel Electrophorosis, A Practical Lecture.pptx
Dr Showkat Ahmad Wani
 
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdfBotany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
JseleBurgos
 
amino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathakamino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathak
GovindaPathak6
 
Presentatation_SM_muscle_structpes_funtionre_ty.pptx
Presentatation_SM_muscle_structpes_funtionre_ty.pptxPresentatation_SM_muscle_structpes_funtionre_ty.pptx
Presentatation_SM_muscle_structpes_funtionre_ty.pptx
muralinath2
 
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Ali Raei
 
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Sérgio Sacani
 
Causes of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptxCauses of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptx
anshumanmohanty9090
 
Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
Metallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda PathakMetallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda Pathak
GovindaPathak6
 
Lecture 12 Types of farming system
Lecture 12       Types of farming systemLecture 12       Types of farming system
Lecture 12 Types of farming system
Nickala1
 
Nutritional Diseases in poultry.........
Nutritional Diseases in poultry.........Nutritional Diseases in poultry.........
Nutritional Diseases in poultry.........
Bangladesh Agricultural University,Mymemsingh
 
Polytene chromosomes. A Practical Lecture.pptx
Polytene chromosomes. A Practical Lecture.pptxPolytene chromosomes. A Practical Lecture.pptx
Polytene chromosomes. A Practical Lecture.pptx
Dr Showkat Ahmad Wani
 
06-Molecular basis of transformation.pptx
06-Molecular basis of transformation.pptx06-Molecular basis of transformation.pptx
06-Molecular basis of transformation.pptx
LanaQadumii
 
biochemistry amino acid from chemistry to life machinery
biochemistry amino acid from chemistry to life machinerybiochemistry amino acid from chemistry to life machinery
biochemistry amino acid from chemistry to life machinery
chaitanyaa4444
 
On the Lunar Origin of Near-Earth Asteroid 2024 PT5
On the Lunar Origin of Near-Earth Asteroid 2024 PT5On the Lunar Origin of Near-Earth Asteroid 2024 PT5
On the Lunar Origin of Near-Earth Asteroid 2024 PT5
Sérgio Sacani
 
Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 
Preparation of Permanent mounts of Parasitic Protozoans.pptx
Preparation of Permanent mounts of Parasitic Protozoans.pptxPreparation of Permanent mounts of Parasitic Protozoans.pptx
Preparation of Permanent mounts of Parasitic Protozoans.pptx
Dr Showkat Ahmad Wani
 
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptxVERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
VERMICOMPOSTING A STEP TOWARDS SUSTAINABILITY.pptx
hipachi8
 
2025 Insilicogen Company Korean Brochure
2025 Insilicogen Company Korean Brochure2025 Insilicogen Company Korean Brochure
2025 Insilicogen Company Korean Brochure
Insilico Gen
 
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Examining Visual Attention in Gaze-Driven VR Learning: An Eye-Tracking Study ...
Yasasi Abeysinghe
 
Gel Electrophorosis, A Practical Lecture.pptx
Gel Electrophorosis, A Practical Lecture.pptxGel Electrophorosis, A Practical Lecture.pptx
Gel Electrophorosis, A Practical Lecture.pptx
Dr Showkat Ahmad Wani
 
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdfBotany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
Botany-Finals-Patterns-of-Inheritance-DNA-Synthesis.pdf
JseleBurgos
 
amino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathakamino compounds.pptx class 12_Govinda Pathak
amino compounds.pptx class 12_Govinda Pathak
GovindaPathak6
 
Presentatation_SM_muscle_structpes_funtionre_ty.pptx
Presentatation_SM_muscle_structpes_funtionre_ty.pptxPresentatation_SM_muscle_structpes_funtionre_ty.pptx
Presentatation_SM_muscle_structpes_funtionre_ty.pptx
muralinath2
 
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Turkey Diseases and Disorders Volume 2 Infectious and Nutritional Diseases, D...
Ali Raei
 
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Direct Evidence for r-process Nucleosynthesis in Delayed MeV Emission from th...
Sérgio Sacani
 
Causes of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptxCauses of mortalities of eggs and spawn and remedies.pptx
Causes of mortalities of eggs and spawn and remedies.pptx
anshumanmohanty9090
 
Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025Keynote presentation at DeepTest Workshop 2025
Keynote presentation at DeepTest Workshop 2025
Shiva Nejati
 
Metallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda PathakMetallurgical process class 11_Govinda Pathak
Metallurgical process class 11_Govinda Pathak
GovindaPathak6
 
Lecture 12 Types of farming system
Lecture 12       Types of farming systemLecture 12       Types of farming system
Lecture 12 Types of farming system
Nickala1
 
Polytene chromosomes. A Practical Lecture.pptx
Polytene chromosomes. A Practical Lecture.pptxPolytene chromosomes. A Practical Lecture.pptx
Polytene chromosomes. A Practical Lecture.pptx
Dr Showkat Ahmad Wani
 
06-Molecular basis of transformation.pptx
06-Molecular basis of transformation.pptx06-Molecular basis of transformation.pptx
06-Molecular basis of transformation.pptx
LanaQadumii
 
biochemistry amino acid from chemistry to life machinery
biochemistry amino acid from chemistry to life machinerybiochemistry amino acid from chemistry to life machinery
biochemistry amino acid from chemistry to life machinery
chaitanyaa4444
 
On the Lunar Origin of Near-Earth Asteroid 2024 PT5
On the Lunar Origin of Near-Earth Asteroid 2024 PT5On the Lunar Origin of Near-Earth Asteroid 2024 PT5
On the Lunar Origin of Near-Earth Asteroid 2024 PT5
Sérgio Sacani
 
Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...Structure formation with primordial black holes: collisional dynamics, binari...
Structure formation with primordial black holes: collisional dynamics, binari...
Sérgio Sacani
 
Ad

Quantum Cryptography and its Applications

  • 1. QUANTUM CRYPTOGRAPHY PRESENTED BY NAME :- BISMAYA BALIARSINGH REGISTRATION NO. :- 2361020052 BRANCH :- MASTER OF COMPUTER APPLICATIONS SECTION :- C1 GUIDED BY :- ASST. PROFESSOR ALOK KUMAR PATI
  • 2. Contents  Introduction  Traditional vs Quantum Cryptography  How Quantum Cryptography works  Applications of Quantum Cryptography  Advantages  Disadvantages  Future Scopes  Conclusion  Bibliography
  • 3. What is Quantum Cryptography & it’s History❔  Quantum Cryptography is an effort to allow two users of common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.  The Heisenberg Uncertainty principle and quantum entanglement can be exploited in as system of secure communication often referred to as “Quantum Cryptography”.  Stephen Wiesner wrote “Conjugate Coding ” in the late sixties , then Charles H. Bennett and Gilles Brassard revived the field in 1982 by combining quantum process with public key cryptography.
  • 5. Traditional vs Quantum Cryptography Traditional  Traditional cryptography is heavily based on mathematical theory and computer science practice, cryptographic algorithms are designed around computational assumptions, making such algorithms hard to break in practice by any adversary. Quantum Cryptography  Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.
  • 6. How Quantum Cryptography works ❔  Quantum cryptography takes advantage of the unique and unusual behavior of microscopic objects to enable users to securely develop secret keys as well as to detect eavesdropping.  Quantum cryptography solves the problems of secret key cryptography by providing a way for two users who are in different locations to securely establish a secret key and to detect if eavesdropping has occurred.  BB84 Protocol most commonly used QKD protocol.
  • 7. Qubit and Quantum Physics 🤔  The most important unit of information in computer science is the bit. There are two possible values that can be stored by a bit: the bit is either equal to “0” or “1”.  Quantum system with at least two states can serve as a qubit. For example, the spin of an Atom or the polarization of a light particle can represent the state of a qubit.  Heisenberg’s Uncertainty Principle: It is possible to encode information into quantum properties of a photon in such a way that any effort to monitor them disturbs them in some detectable way.  Quantum Entanglement: The entangled particles can not be described by specifying the states of individual particles and they may together share information in a form which can not be accessed in any experiment performed on either of the particles alone.
  • 8. Using Quantum Cryptography  The foundation of quantum cryptography lies in the Heisenberg uncertainty principle and Polarization of light.  Basically quantum cryptography is combination of OTP and QKD.  The most widely used PKC is the RSA(Rivest-shamir-Adleman) algorithm based on the difficulty of factoring a product of two large primes. Polarization of Photons
  • 9. QKD & OTP Quantum Key Distribution  QKD uses quantum mechanics to guarantee secure communication and tell us all attempts of eavesdropping.  QKD is only used to produce and distribute a key, not to transmit any message data.  It enables two parties to produce a shared random bit string known only to them, which can be used as a key for encryption and decryption. One Time Pad  OTP is an encryption technique that can not be cracked if used correctly.  The key used in a one-time pad is called a secret key.
  • 10. Suppose consider three people Alice, Bob and Eve where Alice is the sender ,Bob is the receiver and Eve is the eavesdropper.
  • 11. Advantages  Unbreakable security.  Future proof against Quantum Computing Attacks.  Used to detect eavesdropping in quantum key distribution.  No need for mathematical assumptions.  Resistance to Brute-Force Attacks.  Ideal for highly sensitive communications.
  • 12. Disadvantages  Setup is expensive.  Signal is limited up to approx. 400km-500km.  No protection against Denial-0f-Service(DoS) attacks.  Hardware vulnerabilities.  Integration challenges.  Lack of standardization.
  • 13. Future Scopes  Quantum Internet Development.  Integration with Post-Quantum Cryptography(PQC).  Secure Cloud Computing & IoT Protection.  Quantum Cryptography in Financial Transactions.  AI and Quantum Cryptography Convergence.  Standardization and Global Adoption.
  • 14. Conclusion  Quantum Cryptography is a major achievement in security engineering.  Quantum Cryptography is set to revolutionize cybersecurity, but challenges like cost, scalability, and infrastructure development need to be addressed.  As it gets implemented it will allow perfectly secure bank transactions, secret discussions for government officials, and well guarded trade secrets for industry.
  • 15. Bibliography  Risk, W.P.;Bethune, D.S. – “Quantum Cryptography – Using Auto compensating Fiber-Optic Interferometers.” Optics and Photonics News.  id Quantique- “Quantis - OEM Datasheet.” v1.3, July 2004, http://www.idquantique.com.  id Quantique- “White Paper – Random Numbers Generation using Quantum.” Version 2.0, August 2004.  id Quantique- “White Paper – Understanding Quantum Cryptography.” Version 1.0, April 2005.  Wikipedia community- “Quantum Cryptography.” https://en.m.Wikipedia.org/wiki/Quantum_cryptography