Quantum cryptography | Cryptography

Three-stage quantum cryptography protocol

The three-stage quantum cryptography protocol, also known as Kak's three-stage protocol is a method of data encryption that uses random polarization rotations by both Alice and Bob, the two authenticated parties, that was proposed by Subhash Kak. In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used. It is different from methods of QKD (quantum key distribution) for it can be used for direct encryption of data, although it could also be used for exchanging keys. The basic idea behind this method is that of sending secrets (or valuables) through an unreliable courier by having both Alice and Bob place their locks on the box containing the secret, which is also called double-lock cryptography. Alice locks the box with the secret in it and it is transported to Bob, who sends it back after affixing his own lock. Alice now removes her lock (after checking that it has not been tampered with) and sends it back to Bob who, similarly unlocks his lock and obtains the secret. In the braided form, only one-pass suffices but here Alice and Bob share an initial key. This protocol has been proposed as a method for secure communication that is entirely quantum unlike quantum key distribution in which the cryptographic transformation uses classical algorithms The basic polarization rotation scheme has been implemented in hardware by Pramode Verma in the quantum optics laboratory of the University of Oklahoma. In this method more than one photon can be used in the exchange between Alice and Bob and, therefore, it opens up the possibility of multi-photon quantum cryptography.This works so long as the number of photons siphoned off by the eavesdropper is not sufficient to determine the polarization angles. A version that can deal with the man-in-the-middle attack has also been advanced. Parakh analyzed the three-stage protocol under rotational quantum errors and proposed a modification that would correct these errors. One interesting feature of the modified protocol is that it is invariant to the value of rotational error and can therefore correct for arbitrary rotations. (Wikipedia).

Three-stage quantum cryptography protocol
Video thumbnail

Cryptography: Transposition Cipher

This lesson explains how to encrypt and decrypt a message using a transposition cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

A Tutorial on Network Protocols

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Quantum Cryptography in 6 Minutes

Quantum Cryptography explained simply. Regular encryption is breakable, but not quantum cryptography. Today we'll look at the simplest case of quantum cryptography, quantum key distribution. It uses the Heisenberg Uncertainty Principle to prevent eavesdroppers from cracking the code. Hi

From playlist Physics

Video thumbnail

26C3: How you can build an eavesdropper for a quantum cryptosystem 1/6

Clip 1/6 Speakers: Qin Liu ,Sebastien Sauge This presentation will show the first experimental implementation of an eavesdropper for quantum cryptosystem. Although quantum cryptography has been proven unconditionally secure, by exploiting physical imperfections (detector vulnerabilit

From playlist 26C3: Here be dragons day 1

Video thumbnail

Pseudorandom Number Generation and Stream Ciphers

Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.

From playlist Network Security

Video thumbnail

Secure Computation Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

28C3: Quantum of Science (en)

For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speaker: Robert Helling How quantum information differs from classical Quantum systems can have very different properties

From playlist 28C3: Behind Enemy Lines

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 2 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Anne Broadbent - Information-Theoretic Quantum Cryptography Part 1 of 2 - IPAM at UCLA

Recorded 27 July 2022. Anne Broadbent of the University of Ottawa presents "Information-Theoretic Quantum Cryptography" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: These lectures are an introduction to the interplay between quantum information and cryp

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

Quantum Technologies by Aditi De

KAAPI WITH KURIOSITY QUANTUM TECHNOLOGIES SPEAKER: Aditi De (HRI, Allahabad) WHEN: 3pm to 4pm Sunday, 16 June 2019 WHERE: J. N. Planetarium, Sri T. Chowdaiah Road, High Grounds, Bangalore The quantum theory of nature, formalized in the first few decades of the 20th century, contains e

From playlist Kaapi With Kuriosity (A Monthly Public Lecture Series)

Video thumbnail

Classical Verification of Quantum Computations - Urmila Mahadev

Computer Science/Discrete Mathematics Seminar I Topic: Classical Verification of Quantum Computations Speaker: Urmila Mahadev Affiliation: UC Berkeley Date: November 26, 2018 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Craig Costello - Post-quantum key exchange from supersingular isogenies- IPAM at UCLA

Recorded 26 July 2022. Craig Costello of Microsoft Research presents "Post-quantum key exchange from supersingular isogenies" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This talk will give an overview of Supersingular isogeny Diffie-Hellman (SIDH): t

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

22C3: Quantum Entanglement

Speaker: Stephanie Wehner An introduction Entanglement is possibly the most intriguing element of quantum theory. This talk gives a gentle introduction to the phenomenon of entanglement and nonlocality. Uses of entanglement in quantum cryptography and quantum computing are also presente

From playlist 22C3: Private Investigations

Video thumbnail

2022 I E Block Community Lecture: AI and Cryptography

July 13, 2022 How is Artificial Intelligence (AI) changing your life and the world? How can you expect your data to be kept secure and private in an AI-driven future? Kristin Lauter of Meta AI Research gives the I. E. Block Community Lecture titled "Artificial Intelligence and Cryptograph

From playlist SIAM Conference Videos

Video thumbnail

Quantum Computing - The Qubit Technology Revolution

One of the strangest features of quantum mechanics is also potentially its most useful: entanglement. By harnessing the ability for two particles to be intimately intertwined across great distances, researchers are working to create technologies that even Einstein could not imagine, from q

From playlist Explore the World Science Festival

Video thumbnail

Zoé Amblard - Cryptographie quantique, intrication et violations du réalisme local...

Cryptographie quantique, intrication et violations du réalisme local pour les systèmes tridimensionnels

From playlist Journées Codage et Cryptographie 2014

Related pages

Three-pass protocol | Quantum key distribution | List of quantum key distribution protocols | Man-in-the-middle attack