Quantum Cryptography
• 1 Vote(s) - 2 Average
• 1
• 2
• 3
• 4
• 5
 computer science crazy Super Moderator Posts: 3,048 Joined: Dec 2008 22-09-2008, 09:56 AM Definition Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication. It is useful to assume that the communicating parties initially share a small amount of secret information, which is used up and then renewed in the exchange process, but even without this assumption exchanges are possible. The advantage of quantum cryptography over traditional key exchange methods is that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems. Even when assuming hypothetical eavesdroppers with unlimited computing power, the laws of physics guarantee (probabilistically) that the secret key exchange will be secure, given a few other assumptions. Cryptography is the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key. Existing cryptographic techniques are usually identified as ``traditional'' or ``modern.'' Traditional techniques date back for centuries, and are tied to the the operations of transposition (reordering of plaintext) and substitution (alteration of plaintext characters). Traditional techniques were designed to be simple, and if they were to be used with great secrecy extremely long keys would be needed. By contrast, modern techniques rely on convoluted algorithms or intractable problems to achieve assurances of security. There are two branches of modern cryptographic techniques: public-key encryption and secret-key encryption. In public-key cryptography, messages are exchanged using keys that depend on the assumed difficulty of certain mathematical problems -- typically the factoring of extremely large (100+ digits) prime numbers. Each participant has a ``public key'' and a ``private key''; the former is used by others to encrypt messages, and the latter by the participant to decrypt them. In secret-key encryption, a k-bit ``secret key'' is shared by two users, who use it to transform plaintext inputs to an encoded cipher. By carefully designing transformation algorithms, each bit of output can be made to depend on every bit of the input. With such an arrangement, a key of 128 bits used for encoding results in a key space of two to the 128th (or about ten to the 38th power). Assuming that brute force, along with some parallelism, is employed, the encrypted message should be safe: a billion computers doing a billion operations per second would require a trillion years to decrypt it. In practice, analysis of the encryption algorithm might make it more vulnerable, but increases in the size of the key can be used to offset this. The main practical problem with secret-key encryption is determining a secret key. In theory any two users who wished to communicate could agree on a key in advance, but in practice for many users this would require secure storage and organization of a awkwardly large database of agreed-on keys. Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
 seminar addict Super Moderator Posts: 6,592 Joined: Jul 2011 19-01-2012, 11:05 AM to get information about the topic cryptography full report fullreport,ppt and related topic refer the link bellow http://topicideas.org/how-to-palladium-c...ad-seminar and presentation-report http://topicideas.org/how-to-seminar and presentation-report-on-quantum-cryptography http://topicideas.org/how-to-palladium-c...ad-seminar and presentation-report?page=2 http://topicideas.org/how-to-new-trends-...ull-report http://topicideas.org/how-to-cryptography-full-report http://topicideas.org/how-to-java-crypto...-jca--3542 http://topicideas.org/how-to-cryptograph...ull-report http://topicideas.org/how-to-cryptograph...ganography http://topicideas.org/how-to-cryptograph...curity-ppt http://topicideas.org/how-to-imbricate-c...aphy--4792 http://topicideas.org/how-to-quantum-cryptography http://topicideas.org/how-to-cryptography-simple-report http://topicideas.org/how-to-palladium-cryptography
 seminar flower Super Moderator Posts: 10,120 Joined: Apr 2012 19-06-2012, 02:33 PM Quantum Cryptography   Quantum Cryptography.ppt (Size: 405.5 KB / Downloads: 23) what is Quantum Mechanics? Quantum Mechanics is the study of mechanical systems whose dimensions are close to the atomic scale. Quantum effects, such as stable electron orbits, entaglement etc.. are not observable on a macroscopic scale, and exist only at the microscopic level. Applications of Quantum Mechanics range from explaining features of the subatomic world to computational chemistry. Current research is being done in the fields of Quantum Cryptography, Quantum Computing, and Quantum Teleportation. Finding Eve Problem If an eavesdropper were to gain information about the photons' polarization, the laws of quantum physics dictates that the quantum state of the photons would be altered, thus causing errors in Bob's measurements. Solution Alice and Bob compare a subset of remaining bit strings. If more than p bits differ, the key distribution process is aborted and repeated. Privacy Amplification As it is impossible to distinguish between eavesdropping and transmission imperfections, a threshhold p (currently 20%) is set for error margins. If differences occur above the threshhold, privacy amplification can occur. A new key is created by using Alice and Bob's key to produce a new, shorter key, in such a way that the eavesdropper's knowledge about the new key is negligible.