Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
156 views5 pages

Quantum Computing: Paper Presentation ON

1. Quantum computing stores data as quantum bits or qubits that can be in superposition allowing for vastly more complex computations than classical computers. 2. Quantum cryptography uses properties of quantum mechanics like photon polarization to securely transmit encryption keys. The BB84 protocol encodes keys into photon polarization states. 3. If an eavesdropper attempts to intercept the quantum communication during key transmission, their actions would introduce errors detected by the legitimate users, allowing for detection of intrusion.

Uploaded by

Bhargav Lakshman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
156 views5 pages

Quantum Computing: Paper Presentation ON

1. Quantum computing stores data as quantum bits or qubits that can be in superposition allowing for vastly more complex computations than classical computers. 2. Quantum cryptography uses properties of quantum mechanics like photon polarization to securely transmit encryption keys. The BB84 protocol encodes keys into photon polarization states. 3. If an eavesdropper attempts to intercept the quantum communication during key transmission, their actions would introduce errors detected by the legitimate users, allowing for detection of intrusion.

Uploaded by

Bhargav Lakshman
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 5

PAPER PRESENTATION ON QUANTUM COMPUTING

M. Indra Teja IV B.Tech-CSE [email protected]

A.Bharathi IV B.Tech-CSE [email protected]

SRI SAI INSTITUTE OF TECHNOLOGY & SCIENCE

Abstract: Providing security to the data transmitted over a network is called information security. One of the techniques to send data securely over a network is Cryptography. In Cryptography data is encrypted by sender using encryption algorithms for converting original text into cipher text and the receiver gets back the original data by using decryption algorithms. The most secured way for distributing a key over a network is Quantum Cryptography. Quantum Cryptography is used for transmitting data which are in the form of light spots. The technique for storing data in the form of light spots is Quantum Computing. Quantum computing is one of the emerging technologies; it will be one of the rulers in the field of data storage in the upcoming future. It stores the data in the form of light spots rather than ordinary binary bits. Comparatively it

occupies less memory space even for large amount of data. It provides more security than classical bit storage techniques. Quantum Cryptography is a technique to transfer data in terms of light spots; here we need to encrypt the light spots i.e. photons. We encrypt data by polarizing the photons and by de-polarizing we get back the original data. BB84 is the famous protocol used to polarize and de-polarize data.BB84 protocol provides four types of filters to polarize photons into 0, 45, 90, 135 degrees spinning on sender side which is represented by ., /, |, \ respectively. In receiver side it provides + basis rectilinear filter and X basis diagonal filter which is a combination of ., | and /, \ respectively. 0 and 45 degrees represents bit 0 and 90 and 135 degrees represents bit 1.This is a technique to transfer secret key but not for message transfer. This

polarization leads to secured key transfer and helps us in the detection of hackers (intruders). 3. Introduction of Quantum Computing 1. Introduction to Information Security Providing security to the data transmitted over a network is called information security. Information security focuses on preventing external threats such as viruses, worms and from hackers etc through perimeter solutions that includes anti-viruses and Cryptography etc. It is part of Network Security i.e. dealing with the protection of network through many techniques like firewalls etc. 2. Introduction to Cryptography The conversion of data into a secret code for transmission over a public network. The original text, or "plaintext," is converted into a coded equivalent called "cipher text" via an encryption algorithm. The cipher text is decoded (decrypted) at the receiving end and turned back into plaintext.

Quantum computer is a device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. Yuri Manin set forward the idea of quantum computations in 1980. David Deutsch described first universal quantum computer in 1985. In a classical (or conventional) computer, information is stored as bits; in a quantum computer, it is stored as qubits (quantum binary digits). Theoretical part of quantum computing is developed substantially. It takes more than the age of the Universe to factor a 1000-digits number into primes. The increase of processor speed slowed down because of limitations of existing technologies. Theoretically, quantum computers can provide "truly" parallel computations and operate with huge data sets. 3.1. Principle behind Quantum Computing The basic principle of quantum computation is that the quantum properties can be used to represent and structure data and that quantum mechanisms can be devised and built to perform operations with these data. Quantum system is a system of elementary particles (photons, electrons, or nucleus) governed by the laws of quantum mechanics. Although quantum computing is still in its infancy, experiments have been carried out in which quantum computational operations were executed on a very small number of qubits. Both practical and theoretical research continues with interest, and many national government and military funding agencies support quantum computing research to develop quantum computers for both civilian and national security purposes, such as cryptanalysis i.e., through Cryptography. Quantum Cryptography is used to generate and distribute a key, not to transmit any message. It is also used to detect the presence of eavesdropper

Figure 1. Cryptography

4. Quantum Cryptography over Classical Cryptography

(Hacker). In principle, any classical key distribution can always be passively monitored without legitimate users being aware of eaves dropping. Subsequent communication involves sending cryptograms over a public channel, which is vulnerable to total passive eavesdropping. 5. Introduction to Quantum Cryptography To encrypt keys using Quantum cryptography we need polarizing filters or other means for the sender to prepare photons of selected polarizations and a way for the receiver to measure the polarization of the photons. Unpolarized light enters a filter, which absorbs some of the light and polarizes the remainder in the vertical direction. A second filter tilted at some angle absorbs some of the polarized light and transmits the rest, giving it a new polarization. The public channel to discuss and compare the signals sent through the quantum

cannot be identically replicated, the receiver can easily detect if the secret key had been stolen.. 6. BB84 Quantum Key Distribution Protocol It is developed by Charles Bennett and Gilles Brassard in 1984. It is the first Quantum cryptography Protocol. The sender transmits qubits (in the necessary quantity) selected at random from the four kinds i.e.. Any of ---, |, /, \. The receiver randomly selects a measurement device for the two systems and measures each qubit i.e.. Any of +, X. A polarization direction of 0 or 45 may be taken to stand for binary 0, while directions of 90 and 135 may be taken to stand for binary 1.

Figure 3. Polarizing angles Following figure shows the ---, |, /, \ and +, X polarizers.

channel, testing them for evidence. Figure 2: polarization 5.1. Principlebehind Quantum Cryptography Works on the basis of Heisenberg uncertainty principle. It states that, certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value of the other. It utilizes the property that the quantum state is very delicate to the external environment, and is warped when an eavesdropper observes it. Since the secret key encoded in the quantum state, single photon,

Figure 4. Quantum Cryptography Here we come across the following notations: | -- a photon in a vertically polarized state.

-- -- a photon in a horizontally polarized state. / -- a photon in a 45 degree polarized state. \ -- a photon in a 135 degree polarized state. + -- the pair of states {|,.}, also called the +- basis. X -- the pair of states {\, /}, also called the x-basis. 7. Quantum Key Distribution with BB84 BB84 quantum key distribution protocol proceeds through the following steps:Alice sends photons with one of the four polarizations, which she chooses at random.

Alice and Bob keep all cases in which Bob should have measured the correct polarization. These cases are then translated into bits (1s and 0s) to define the key.

An overall view of above process


A lic e s e n d s to B o b |

/ +

--- \ x x \ \ 1

--- --- / + x x / / 0

| x /

| + | | 1

B o b m e a s u r e s w +t h i

B o b r e s u l t s s V a lid d a ta

| | 1

--- /

--- / --0

For each photon, Bob chooses at random the type of measurement: either the +-basis or the Xbasis.

S ift e d k e y

. 8. Intrusion Techniques Alice and Bob communicate on the public network as the coz is to detect the presence of an intruder. Bob fails to measure the photon particle though he uses a correct polarizer. Eve's use of the wrong polarizer will warp that photon and will cause Bob to make errors even when he is using the correct polarizer. As the results of the Alice and Bob are unfair they suspect the presence of an Eavesdropper 9. Advantages Secure. Unbreakable. Transmission of data intrusion/attack detection.

For each photon, bob records the basis he used and results of the polarization measurement.

After the entire transmission, Bob and Alice have a non-encrypted (PUBLIC) discussion about the transmission. Their conversation may sound a little like this: Bob: plus Bob: X Alice: correct Alice: Incorrect

with

Multiparty quantum key distribution possible. Extends its security in optical fibres too. Interception by an eaves dropper in real time is highly impossible.

10.Limitations
A number of technical challenges still remain in quantum cryptography. The following discussion will be brief and follow. 1) Single Photon generating systems. 2) Deterministic Random number generation by computers. 3) Quantum repeaters to strengthen the photons. 4) Low transmission rate. 11. Conclusion 1. Where privacy and secrecy is a paramount. 2. Quantum based cryptosystems provides a better assuring solution to the key distribution security So, the guaranteed fact that (Quantum key distribution + Secure communication) = Private Key cryptography 3. Within the next few years, such systems could start encrypting some of the most valuable secrets of government and industry. 12. References [1] [Bacon 2004] D. Bacon, Quantum computational complexity in the presence of closed timelike curves, Phys. Rev. A, 2004. [2] K. H. Ko, S. J. Lee, A new [Birman-KoLee 1998] J. S. Birman, approach to the word and conjugacy problems in the braid groups, Adv. Math. 139 (1998). [3] [Blum-Kalai-Wasserman 2003] A. Blum, A. Kalai, H. Wasserman,try problem, and the statistical Noise-tolerant learning, the pari query model, J. ACM 50(4): 506519 (2003).

[4] [Bridson-Howie 2003] M. R. Bridson, J. Howie, Conjugacy of groups, IJAC 15(1), 2005. finite subsets in hyperbolic [5] Buchmann et al. 2004] J. Buchmann, C. Coronado, M. Dring, D. A. Schmidt, U. Vollmer, R.-P. Engelbert, C. Ludwig, R. Overbeck Weinmann, Post-Quantum Signatures, 2004. e Signatures with Virtually [Buchmann et al. 2007] Merkl [6] Unlimited Signature Capacity, ACSN2007, LNCS 4521, 2007. [Bacon 2004] D. Bacon, Quantum computational complexity in the presence of closed timelike curves, Phys. Rev. A, 2004. [7] K. H. Ko, S. J. Lee, A new [Birman-KoLee 1998] J. S. Birman, approach to the word and conjugacy problems in the braid groups, Adv. Math. 139 (1998). [8] Blum-Kalai-Wasserman 2003] A. Blum, A. Kalai, H. Wasserman,ty problem, and the statistical Noise-tolerant learning, the pari query model, J. ACM 50(4): 506519 (2003). [9] [Bridson-Howie 2003] M. R. Bridson, J. Howie, Conjugacy of groups, IJAC 15(1), 2005. finite subsets in hyperbolic [10] [Buchmann et al. 2004] J. Buchmann, C. Coronado, M. Dring, D. A. Schmidt, U. Vollmer, R.-P. Engelbert, C. Ludwig, R. Overbeck Weinmann, Post-Quantum Signatures, 2004.

You might also like