Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

SECUREDATA TRANSM ISSION

USING QUANTUM CRYPTOGRAPHY


P H A S E 2 P R O J E C T P R E S E N T A T I O N
M E T H O D O L O G Y

Presented by, Under the Guidance of,


Moham m ed Sabeel Gautham.M,
Shreya Ponnam m a N.N Asst.Professor,
Sinchan Muthappa Dept. of C SE,
Syed Tarooq Afnan NIEIT, Mysuru.
CONTENTS
Objectives

Design

Methodology

System requirements

References
OBJECTIVES
The objectives of secure data transmission using quantum cryptography revolve around ensuring the

confidentiality and integrity of transmitted data. Quantum cryptography employs the principles of quantum

mechanics to achieve these objectives in a highly secure manner. Here are the primary goals:

1.Confidentiality: The fundamental principles of quantum mechanics, such as the no-cloning theorem and

the disturbance caused by measurement.

2.Key Distribution: Quantum cryptography focuses on securely distributing cryptographic keys between

communicating parties. Through protocols like BB84, E91, or other quantum key distribution schemes.

3.Detection of Eavesdropping: One of the key objectives is to detect any attempts at eavesdropping or

interception.

4. Unforgeability and Integrity: Quantum cryptography aims to ensure the integrity of transmitted data. While
LEARN

quantum cryptography primarily focuses on key distribution.


DESIGN

USER 1 Upload View Manage Request


Register Login
(owner) dataset Request using(key)

USER 2 View
Request Download
Register Login
(receiver)
dataset Dataset Datase (key)

Admin M anage Manage


Users Datasets Logout
METHODOLOGY

1.Quantum Key Distribution 2.Quantum 3.Quantum Key Generation:


(QKD) Protocols: Entanglement:
entangled particles ensure that any exchange of quantum states, both parties
attempt to intercept or measure them by perform measurements using agreed-
QKD protocols like BB84, E91,
a third party would disrupt their upon bases.
entanglemen,

6.Physical Security
4.Error Detection and 5.Classical
Measures &
Privacy Amplification: Cryptography
Authentication and
Integration:
Verification
used to reconcile differences generated secure key from the QKD
process is typically used in combination help prevent tampering &authenticity of
with classical cryptographic methods the communicated data, authentication
methods, and digital signatures might be
employed
A LGORITHM S
1.QKD
QKD algorithms provide a method for establishing secure communication channels by exploiting the
fundamental principles of quantum mechanics, offering a highly secure means of key exchange that
is theoretically resistant to interception or decryption by any third party.
2.BB84

BB84 is a quantum key distribution (QKD)


protocol, a method for securely sharing
cryptographic keys between two parties using
the principles of quantum mechanics. It was
developed by Charles Bennett and Gilles
Brassard in 1984.
.BB84 ensures the security of the key
distribution by exploiting the quantum
properties of particles, providing a means of
detecting any potential eavesdropping and
enabling the creation of a shared secret key
that can be used for secure communication.
3.EKERT PROTOC OL

It's an early example of a QKD protocol,


offering a way to establish a shared secret key
between two parties using quantum
entanglement.This protocol uses the concept
of quantum entanglement, a phenomenon
where two or more particles become
interconnected in such a way that the state of
one particle is directly related to the state of
the other(s), regardless of the distance
between them.
SYSTEM
REQUIREMENT
S PEC IFIC ATIONS
HARDWARE SOFTWARE
01 02
REQUIREMENTS REQUIREMENTS

Processor : Intel i3 2.53GHz Opera ting system : W indows 10 a nd a bove


Hard Disk : 40GB Front End : Fla sk ( HTML, CSS, J S)
RAM : 4 GB or above Coding Language : java
IDE : SQLite
Tha nk You

You might also like