DOC PREVIEW
SJSU CS 265 - QUANTUM CRYPTOGRAPHY

This preview shows page 1-2-3-4 out of 11 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 11 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

QUANTUM CRYPTOGRAPHYClassic CryptographyQuantum vs. ClassicSlide 4Fundamental ConceptsSlide 6How it works?BB84Quantum Key DistributionVerification of QCReferencesQUANTUM CRYPTOGRAPHYNarayana D KashyapSecurity through UncertaintyCS 265Spring 2003Classic CryptographyKeys by Transposition and SubstitutionStrength mainly on Long Keys KDCMathematical Concepts Allows the eavesdropper in principle to measure physical properties without disturbing them.Quantum vs. ClassicPhysics instead of MathExchange of information – very secure in a strong sense.Laws of physics guarantee (probabilistically) that the secret key exchange will be secure.The ACT OF MEASUREMENT is an integral part of quantum mechanics, not just a passive, external process as in Classic Crypto.Fundamental ConceptsQuantum Channel along with Quantum theoryHeisenberg Uncertainty Principle – certain pairs of physical properties are complementary.Any effort to monitor the channel necessarily disturbs the signal in some detectable way. The uncertainty principle is used to build secure channel based on Quantum properties of light.Photons & PolarizationHow it works?Bob, informed about polarization being either 0 or 90 (rectilinear), can find out by his photomultiplier as to how it was sent.Such an apparatus is useless for distinguishing 45 or 135 (diagonal) photons - unless the apparatus is turned 45 degrees.Rectilinear and Diagonal polarizations are complementary properties.BB84Bennett and Brassard proposed in 1984 Quantum channel – Polarized PhotonsPublic channel – Normal MessagesAlice = Sender & Bob = receiverAgreed before hand that 90 and 45 are 1’s 0 and 135 are 0’s     1 1 0 0 1 AliceBobAliceBobQuantum Key DistributionVerification of QCAlice and Bob to compare the "parity"-evenness or oddness of a publicly agreed on random subset containing about half the bits in their data. Alice could tell Bob, "I looked at the 1st, 3rd, 4th, 9th,...996th and 999th of my 1,000 bits of data, and they include an even number of l's." It suffices to repeat the test 20 times, with 20 different random subsets, to reduce the chance of an undetected error to less than one in a million.ReferencesQuantum Cryptographyhttp://www.cyberbeach.net/~jdwyer/quantum_crypto/quantum1.htmQuantum Cryptography Tutorialhttp://www.cs.dartmouth.edu/~jford/crypto.htmlOxford Quantum Computation Group


View Full Document

SJSU CS 265 - QUANTUM CRYPTOGRAPHY

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download QUANTUM CRYPTOGRAPHY
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view QUANTUM CRYPTOGRAPHY and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view QUANTUM CRYPTOGRAPHY 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?