Palani Document

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

A

Seminar Report
on

QUANTUM CRYPTOGRAPHY

Submitted in partial fulfilment for the award of the degree


of
MASTER OF COMPUTER APPLICATIONS
Submitted by
P C PALANI
(Reg No. 22F61F0032)

Under the esteemed guidance of


Mr. K G PONNAMBALAM, MCA.
Assistant Professor, Department of MCA.

Department of Master of Computer Applications

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY


(AUTONOMOUS)
(Approved by AICTE, New Delhi & Affiliated to JNTUA, Anantapuramu)
(NAAC Accredited with “A+ ” Grade, NBA Accredited Institution)
Siddharth Nagar, Narayanavanam Road, Puttur-517583, AP.

2023-2024
ABSTRACT

Quantum Cryptography, an emergent field at the intersection of quantum mechanics and


information science, promises a revolutionary approach to secure communication. This
introduction sets the stage by providing a foundational overview of the principles that underpin
quantum cryptography. Starting with a brief history, the document traces the evolution from
classical to quantum cryptography, emphasizing the limitations of traditional cryptographic
methods in the face of quantum computing advancements. Key quantum mechanical principles,
including superposition, entanglement, and the no-cloning theorem, are introduced as the
bedrock upon which quantum cryptography is built. The concept of qubits, the quantum
counterparts to classical bits, is explored, highlighting their unique ability to exist in multiple
states simultaneously. The section further delves into the phenomenon of quantum
entanglement, a feature central to many quantum cryptographic protocols.

Keyword: Quantum Cryptography, Qubits, Quantum Mechanics, Quantum Key Distribution


(QKD), Entanglement
CONTENTS

S. No. CHAPTERS Page No.


1. INTRODUCTION 1
2. KEY CONCEPTS IN QUANTUM CRYPTOGRAPHY 1
3. ARCHITECTURE 2
4. DIFFERENCE BETWEEN TC AND QC 3
5. WORKING OF QC 5
6. BENEFITS OF QC 5
7. LIMITATIONS OF QC 6
8. CONCLUSION 7
9. REFERENCE 7
QUANTUM CRYPTOGRAPHY

1. INTRODUCTION quantum transmission and hence the


eavesdropping is detected by users.
Quantum cryptography is a branch of
quantum information science that focuses 2. KEY CONCEPTS IN
on the use of quantum mechanics to secure QUANTUM
communication. CRYPTOGRAPHY
Unlike classical cryptography, which relies Quantum Key Distribution (QKD):

on mathematical algorithms and the The most well-known application of


complexity of certain problems for security, quantum cryptography is Quantum Key
quantum cryptography leverages the Distribution. QKD allows two parties to
principles of quantum mechanics to provide produce a shared random secret key, which
a fundamentally secure way to transmit can then be used to encrypt and decrypt
information. messages. The key distribution process is

Quantum cryptography holds the promise secured by the principles of quantum

of providing unconditionally secure mechanics, making it theoretically immune

communication channels, but practical to any eavesdropping attempts.

implementations are still in the early stages Superposition:


of development. Researchers are actively
In quantum mechanics, particles can exist
working on overcoming technical
in multiple states at the same time, known
challenges to make quantum cryptographic
as superposition. This property is used to
systems more practical and widely
create quantum bits or qubits, which can
applicable in real-world scenarios.
represent both 0 and 1 simultaneously. This
Quantum cryptography is an emerging superposition forms the basis for quantum
technology in which two parties can secure key distribution.
network communications by applying the
Entanglement:
phenomena of quantum physics.
Quantum entanglement is a phenomenon
The appealing characteristic of quantum
where two or more particles become
cryptography is the possibility of
correlated in such a way that the state of one
distributing secret key between two users in
particle instantly influences the state of the
a manner that it is impossible for a third
others, regardless of the distance between
party to eavesdrop without changing the
them. Entanglement is used in quantum

DEPARTMENT OF MCA, SIETK Page | 1


QUANTUM CRYPTOGRAPHY

cryptography to enhance the security of key designed to exploit the principles of


distribution. quantum mechanics for secure
communication. The primary focus is on
Uncertainty Principle:
Quantum Key Distribution (QKD), which
The Heisenberg Uncertainty Principle is a enables the establishment of secret keys
fundamental concept in quantum between two parties in a way that any
mechanics, stating that certain pairs of eavesdropping attempt can be detected.
properties (like position and momentum) Here is a general overview of the
cannot be simultaneously measured with architecture of quantum cryptography:
arbitrary precision. This principle
BB84 Protocol: Proposed by Charles
introduces a level of unpredictability that
Bennett and Gilles Brassard in 1984, the
can be harnessed for cryptographic
BB84 protocol is one of the earliest and
purposes.
most well-known QKD protocols. It
3. ARCHITECTURE OF QC involves the transmission of quantum bits
It is an iterated cipher that has a (qubits) in one of two bases (e.g., rectilinear
conservative design which is easily or diagonal). The sender and receiver
implemented on both hardware and communicate openly about the bases used,
software. allowing them to discard incompatible bits
and establish a secret key.
It operates with block size of 128-bits and
with three variable key lengths of 128-bits, E91 Protocol (Entanglement-based
192-bits and 256-bits in addition to sixteen Protocol): This protocol relies on the
rounds or multiples of four rounds. creation of entangled particle pairs.
Changes in the state of one particle instantly
affect the state of its entangled partner. By
measuring these entangled particles, two
parties can create a shared secret key while
detecting any eavesdropping attempt.

Quantum cryptography architecture aims to


provide a foundation for secure
communication by leveraging the unique
properties of quantum mechanics. While
The architecture of quantum cryptography
practical implementations face challenges,
involves several components and protocols

DEPARTMENT OF MCA, SIETK Page | 2


QUANTUM CRYPTOGRAPHY

ongoing research and technological cryptography systems can be compromised


advancements are making quantum if sufficiently powerful classical or
cryptography more feasible for real-world quantum computers emerge that can
applications. efficiently solve these mathematical
problems.
4.DIFFERENCE BETWEEN
TC AND QC 2. Key Distribution:

Quantum Cryptography: Quantum Key


Quantum cryptography and traditional
Distribution (QKD) is a primary application
(classical) cryptography differ
of quantum cryptography. It allows two
fundamentally in their underlying
parties to establish a secret key by
principles and methods of securing
exchanging quantum bits (qubits) without
information. Here are key differences
revealing the key to any potential
between quantum cryptography and
eavesdropper. The security is based on the
traditional cryptography:
principles of quantum mechanics, ensuring
1. Basis of Security: that any attempt to intercept the key is
detectable.
Quantum Cryptography: It relies on the
principles of quantum mechanics, such as Traditional Cryptography: Key
the no-cloning theorem, Heisenberg distribution in classical cryptography often
uncertainty principle, and quantum relies on secure channels or the use of
entanglement. The security of quantum asymmetric algorithms for exchanging
cryptography is based on the physical keys. While classical systems can provide
properties of quantum systems, providing a secure key exchange, they are potentially
level of security that is theoretically vulnerable to attacks on the mathematical
unbreakable using computational methods. algorithms used.

Traditional Cryptography: It relies on 3. Resistance to Quantum Attacks:


mathematical algorithms, and the security
Quantum Cryptography: Quantum
is based on the complexity of certain
computers have the potential to break many
mathematical problems, such as factoring
widely used classical cryptographic
large numbers or solving discrete logarithm
algorithms, such as RSA and ECC, through
problems. The security of traditional
algorithms like Shor's algorithm. However,

DEPARTMENT OF MCA, SIETK Page | 3


QUANTUM CRYPTOGRAPHY

quantum cryptography is specifically the difficulty of solving certain


designed to be resistant to quantum attacks, mathematical challenges.
making it a potential solution for securing
5. Real-Time Eavesdropping Detection:
information in a post-quantum computing
era.
Quantum Cryptography: Quantum
systems allow for the real-time detection of
Traditional Cryptography: Classical
eavesdropping attempts. Any measurement
cryptographic algorithms that are widely
or interaction with a quantum state
used today, like RSA and ECC, could be
inevitably disturbs it, providing a
vulnerable to quantum attacks once large-
mechanism for detecting the presence of an
scale, fault-tolerant quantum computers
eavesdropper.
become available. This has led to the
development of post-quantum
Traditional Cryptography: Classical
cryptographic algorithms as a response to
systems generally do not provide real-time
the threat posed by quantum computers.
detection of eavesdropping. Compromised
keys or intercepted communications may
4. Security Proofs:
go undetected until after the fact.
Quantum Cryptography: Security in
In summary, quantum cryptography and
quantum cryptography is often based on the
traditional cryptography differ in their
fundamental principles of quantum
foundational principles, methods of key
mechanics, and proofs typically rely on the
distribution, resistance to quantum attacks,
impossibility of certain actions within
and real-time eavesdropping detection
quantum physics, such as the impossibility
capabilities. While quantum cryptography
of cloning an unknown quantum state.
offers unique advantages in terms of
Traditional Cryptography: Security in security based on quantum principles, it is
classical cryptography is often based on the still in the early stages of practical
hardness of specific mathematical implementation, and traditional
problems, and the security proofs are cryptography continues to be widely used
grounded in mathematical complexity for securing information in the classical
theory. The security of classical computing era.
cryptographic algorithms is contingent on

DEPARTMENT OF MCA, SIETK Page | 4


QUANTUM CRYPTOGRAPHY

5.WORKING OF QC photons are oscillating, or vibrating, in a


certain manner.
The working of Quantum Computing (QC)
involves leveraging the principles of So, before Alice, the sender, initiates the
quantum mechanics to perform message, the photons travel through a
computations. Unlike classical computers polarizer. The polarizer is a filter that
that use bits to represent either a 0 or a 1, enables certain photons to pass through it
quantum computers use quantum bits or with the same vibrations and lets others
qubits, which can exist in a superposition of pass through in a changed state of vibration.
both 0 and 1 simultaneously. This allows The polarized states could be vertical (1
quantum computers to perform certain bit), horizontal (0 bit), 45 degrees right (1
types of calculations much more efficiently bit) or 45 degrees left (0 bit). The
than classical computers. Here are the key transmission has one of two polarizations
components and principle involved in the representing a single bit, either 0 or 1, in
working of quantum computing. either scheme she uses

The working of quantum cryptography


involves utilizing the principles of quantum
mechanics to secure communication
channels. The primary focus is on Quantum
Key Distribution (QKD), a subfield of
quantum cryptography that enables the
establishment of secret keys between two
parties with the assurance that any
eavesdropping attempt will be detected.

The model assumes there are two people


named Alice and Bob who wish to
exchange a message securely. Alice
6.BENITS OF QC
initiates the message by sending Bob a key.
The techniques that cryptographers utilize
The key is a stream of photons that travel in
can ensure the confidential transfer of
one direction. Each photon represents a
private data. Techniques relating to digital
single bit of data -- either a 0 or 1. However,
signatures can prevent imposters from
in addition to their linear travel, these
intercepting corporate data, while

DEPARTMENT OF MCA, SIETK Page | 5


QUANTUM CRYPTOGRAPHY

companies can use hash function impossible for an eavesdropper to intercept


techniques to maintain the integrity of data a quantum key undetected. This contrasts
with classical cryptographic methods that
Better security for internet communication
could be vulnerable to attacks as
as it relies on the laws of physics.
computational power increases.
Can detect eavesdropping, enabling the
receiver to request another key.

Provides various security methods.

Virtually unhackable as the quantum states 7.LIMITATIONS OF QC


change rapidly. Changes in polarization and error
Offers multiple methods for securit rates.: Photons may change polarization in
transit, which potentially increases error
rates.
Provides secure communication. Instead of
Range: The maximum range of quantum
difficult-to-crack numbers, quantum
cryptography has typically been around
cryptography is based on the laws of
400 to 500 km, with the exception of Terra
physics, which is a more sophisticated and
Quantum, as noted below.
secure method of encryption.
Expense: Quantum cryptography typically
Detects eavesdropping. If a third party
requires its own infrastructure, using fiber
attempts to read the encoded data, then the
optic lines and repeaters.
quantum state changes, modifying the
expected outcome for the users Number of destinations: It is not possible
to send keys to two or more locations in a
Offers multiple methods for security. There
quantum channel.
are numerous quantum cryptography
protocols used. Some, like QKD, for Currently, the drawbacks of quantum
example, can combine with classical cryptography include: Can only be used in
encryption methods to increase security. short distances. Very expensive to
implement on a scale. The technology is
Quantum cryptography provides
practically still not here yet.
unconditional security in key distribution.
The security is based on the principles of There are several limitations of quantum
quantum mechanics, making it theoretically computing

DEPARTMENT OF MCA, SIETK Page | 6


QUANTUM CRYPTOGRAPHY

Although a qubit can hold many possible communications, from military secrets to
values but only one classical result can be financial transactions.
obtained from every run,
Quantum cryptography represents a
hence the output is probabilistic. groundbreaking approach to securing
communication channels by leveraging the
Repeated runs may be necessary to obtain
principles of quantum mechanics. The core
the desired result.
tenets of quantum key distribution, such as
The computation must be reversible. the no-cloning theorem, superposition, and

It is impossible to copy qubits (no-cloning entanglement, offer a unique foundation for

theorem). achieving unconditional security in key


exchange. The ability to detect
Measuring (reading / evaluating) the state
eavesdropping in real-time, a feature
of a qubit register destroys the original
embedded in the quantum nature of the
quantum state that was being measured.
communication, adds an extra layer of
Many algorithms only give the correct confidence in the integrity of the exchanged
answer with a certain probability. keys.

The probability can be increased by


repeatedly reinitializing the computer,
9. REFERENCE:
rerunning the algorithm and measuring the
https://www.google.com/search?q=difference+
new results.
between+tc+and+qc&oq=difference+between
+tc+and+qc&gs_lcrp=EgZjaHJvbWUyBggAE
Quantum computers are still in their
EUYOdIBCTM5MDc1ajBqN6gCALACAA&
infancy and are extremely expensive sourceid=chrome&ie=UTF-8
https://www.google.com/search?q=difference+
between+quantum+cryptography+and+traditio
nal+cryptography&oq=difference+between+q
8. CONCLUSION uantum+cryptography+and+traditional+crypto
graphy&gs_lcrp=EgZjaHJvbWUyBggAEEUY
Quantum cryptography is still in its early OdIBCTMxMTY3ajBqN6gCALACAA&sour
ceid=chrome&ie=UTF-8
stages of development, but it has the
https://www.google.com/search?sca_esv=8ae
potential to revolutionize the way we
9a4f0a7e64b77&hl=en&sxsrf=ACQVn08K4gx_
communicate. It offers a level of security 9CDUDyAwEZph_JWHzS1JHg:1707784855147
that is impossible to achieve with &q=working+of+quantum+cryptography+docu
ment&tbm=isch&source=lnms&sa=X&ved=2a
traditional cryptography, and it could be hUKEwi8_JKtiqeEAxUbXmwGHQiBBHkQ0pQJe
used to secure a wide range of gQIDBAB&biw=1920&bih=945&dpr=1

DEPARTMENT OF MCA, SIETK Page | 7


QUANTUM CRYPTOGRAPHY

https://www.google.com/search?q=benifits+o
f+quantum+cryptography&source=lmns&bih=
945&biw=1920&hl=en&sa=X&ved=2ahUKEwi
v4LKkh6eEAxX-
0KACHYeZDcYQ0pQJKAB6BAgBEAI

https://chat.openai.com/c/be6afc98-fa34-
479a-9dca-e3cb903bdd76

DEPARTMENT OF MCA, SIETK Page | 8

You might also like