12
101010000111100…….. New Dawn of Security in Telecommunications: Quantum Cryptography Presented By: Mayssaa El Rifai Bhagyashri Arun Darunkar University of Oklahoma, Tulsa

New Dawn of Security in Telecommunications: Quantum Cryptography

Embed Size (px)

DESCRIPTION

Presented by: Mayssaa El Rifai and Bhagyashri Arun Darunkar

Citation preview

Page 1: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

New Dawn of Security in Telecommunications: Quantum

Cryptography

Presented By: Mayssaa El Rifai

Bhagyashri Arun Darunkar

University of Oklahoma, Tulsa

Page 2: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Introduction: Need for secure communication

*Ref: —Milner, Newsweek, Oct. 10, 20112

Page 3: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Timeline of Secure Communication

3

Page 4: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Why Quantum Cryptography?

• Quantum Cryptography was first proposed in 1970• The first protocol in quantum cryptography was proposed in a paper published in

1984 by Bennett and Brassard (BB84)• The basics of the quantum cryptography rest on two main principles

The Heisenberg uncertainty principle

The no-cloning theorem

4

Page 5: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Protocols

5

Page 6: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Limitations of BB’84

6

Single photon requirement Data rate Distance

Limitations

Solution

USE MULTI-PHOTON TOLERANT QUANTUM SECURE PROTOCOL

Page 7: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

The Three-stage Protocol: Idea

ALICE BOB

ALICE BOB

Information

Information

Information

Information

7

Page 8: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

The Three-Stage Protocol: Science

Proposed by Dr. Kak in 2006X

UA

X

UB

UA(X)

8

Page 9: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

The Single-stage protocolAlice and Bob make use of this shared information to form new key by using concept of

braiding

ALICE BOBInformation

Information

Variation in Dr. Kak’s protocol, proposed by James ThomasAssumption Prerequisite

9

Page 10: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Summary

10

Page 11: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Thank You

Any Questions?

11

Page 12: New Dawn of Security in Telecommunications: Quantum Cryptography

101010000111100……..

Contact DetailsBhagyashri Darunkar Email: [email protected] El Rifai Email: [email protected]

12