Quantum Cryptography full report
#1

Quantum Cryptography


.rtf   Quantum Cryptography.rtf (Size: 3.31 MB / Downloads: 3)

Introduction

Cryptology, the mathematical science of secret communications, has a long
and distinguished history of military and diplomatic uses dating back to the
ancient Greeks.
2
In World War II, Allied successes in breaking the ciphers of
Germany and Japan played an important part in the outcome of the conflict and
the development of the modern computer.
3
Today, the ability to ensure the
secrecy of military or diplomatic communications is as vital as ever, but
cryptography is also becoming more and more important in everyday life.


Cryptography

To explain the significance of quantum cryptography it is necessary to
describe some of the important features (and perils) of cryptography in general.
These points can be illustrated with one of the most famous literary examples of a
cipher: Sir Arthur Conan Doyle’s “The Adventure of the Dancing Men.”
1
In this
story, Elsie, the American wife of an English gentleman, Hilton Cubbitt, is
terrorised by the appearance of chalked stick-figures outside her house. (See
Figure 1.) Sherlock Holmes is called in and quickly realises that the figures are not
the scribblings of children, but rather are a form of cryptography, in which each
letter of the alphabet has been substituted with a stick figure, known only to the
sender (Abe Slaney, “the most dangerous crook in Chicago”) and the intended
recipient, Elsie.



Quantum key distribution

To understand QKD we must first move away from the traditional key
distribution metaphor of Alice sending
particular
key data to Bob. Instead, we
should have in mind a more symmetrical starting point, in which Alice and Bob
initially generate their own, independent random number sets, containing more
numbers than they need for the key material that they will ultimately share. Next,
they compare these sets of numbers to distil a shared subset, which will become
the key material. It is important to appreciate that they do not need to identify
all
of their shared numbers, or even
particular
ones, because the only requirements
on the key material are that the numbers should be secret and random. They can
attempt to accomplish a secret distillation if Alice prepares a sequence of tokens,
one kind for a “0” and a different kind for a “1”, and sends a token to Bob for
each bit in her set. Bob proceeds through his set bit-by-bit in synchronisation with
Alice, and compares Alice’s token with his bit, and replies to Alice telling her
whether the token is the same as his number (but not the value of his bit).


Practical implementations of QKD
Perhaps the most obvious way to implement the QKD quantum channel is
with single-photon polarization states, such as the preparation of vertical and
right-handed-circular polarizations, and the measurement of horizontal linear and
left-handed-circular polarizations.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: full ppt with abstract on cryptography, cryptography full report and ppt for cs, electronics quantum cryptography, report on cryptography, cryptography full report, quantum cryptography demo, quantum cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,800 09-07-2016, 12:36 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,852 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,553 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,140 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,796 24-10-2014, 11:49 PM
Last Post: jaseela123d
  TERRORISM full report project uploader 2 2,292 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,456 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,492 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,458 11-01-2013, 10:18 AM
Last Post: seminar details
  SOLAR POWER TOWER full report seminar details 1 2,342 30-11-2012, 01:39 PM
Last Post: seminar details

Forum Jump: