A method for protecting information transmission confidentiality is quantum cryptography. Combining quantum mechanics enables a variety of cryptography operations that are not possible with non-quantum communication. Quantum Cryptography sounds difficult, which is probably true. Quantum cryptography, which is distinct from post-quantum cryptography and has been studied for a few decades, is quickly becoming more crucially relevant to our daily lives because it can protect critical data in a way that current encryption techniques cannot. In order to secure and transmit data in a way that cannot be intercepted, quantum cryptography uses the inherent properties of quantum mechanics. Data is encrypted and protected using cryptography so that only those with the proper secret key can decrypt it. In contrast to conventional cryptographic systems, Quantum Cryptography uses physics rather than mathematics as the primary component of its security model. Quantum cryptography is a system that cannot be broken into without the sender or receiver of the message being aware of it. It is therefore impossible to copy or view data encoded in a quantum state without disclosing the act to the sender or recipient. Quantum Cryptography ought to be impervious to quantum computer users as well. Data is transmitted over fibre optic wire using individual light particles, or photons, in quantum cryptography. Binary bits are represented by photons. Quantum mechanics is a key component of the system's security. These safe areas consist of the following:
Components of Quantum Cryptography-
Due to the fact that they possess all the requirements for quantum cryptography, photons are used in this technology. They function as information carriers in optical fibre cables and their behaviour is well understood. Quantum key distribution (QKD), which offers a secure method for key exchange, is one of the most well-known examples of Quantum Cryptography at the moment. The model that underpins quantum cryptography was created in 1984. The simulation makes the assumption that Alice and Bob are two individuals who want to securely communicate. Alice starts the communication by delivering a key to Bob. A stream of photons that move in only one direction holds the secret. Every photon is a single bit of information, either a 0 or a 1. But these photons are also oscillating, or vibrating, in addition to their linear motion. The photons pass through a polarizer before Alice, the sender, starts the message. A filter called a polarizer allows some photons to pass through with the same vibrations while allowing other photons to pass through with a different vibration. The polarised states could be 45 degrees left, 45 degrees right, vertical (1 bit), horizontal (0 bit), or diagonal (45 bits) (0 bit). In either of the schemes she employs, the transmission has one of two polarizations representing a single bit, either a 0 or a 1. Now, Bob, the photons are moving from the polarizer to the receiver along an optical fibre. A beam splitter is used in this process to determine each photon's polarisation. Bob chooses one polarisation at random because he does not know the proper polarisation of the photons when he receives the photon key. To determine which polarizer Alice used to send each photon, Alice now compares the tools Bob used to polarise the key. Bob then checks to make sure he used the right polarizer. The sequence that is left after discarding the photons that were read with the incorrect splitter is regarded as the key.
0 Comments
Leave a Reply. |
Categories
All
|