Académique Documents
Professionnel Documents
Culture Documents
Matthew Suhre
Overview
Algorithm Example History Process Pros and Cons Open Air Cryptography
Quantum Cryptography
Cryptography History
Cryptography Basics
Cryptosystem (Cipher System) method of disguising messages so that only certain people can read them Cryptography Art of creating and using Cryptosystems Cryptanalysis Art of breaking Cryptosystems Cryptography study of Cryptography and Cryptosystems
Cryptography Basics
Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt
RSA Encryption
Invented in 1978 by Ron Rivest, Adi Shamir and Leonard Adleman Algorithm for public key encryption
1. Find P and Q two large prime numbers 2. Choose E such that: 1<E<PQ
E does not have to be prime, but must be odd (P-1)(Q-1) and E must not have no prime factors in common
RSA Encryption
Relying on
No one can solve Would take to long to solve
Early 1970s Stephen Wiesner wrote Conjugate Coding 1979 Charles H. Bennett and Gilles Brassard wrote various papers on the subject Basis: Takes advantage of Heisenbergs principle in which measuring a quantum system disturbs it and yields incomplete information
Most widely used is the BB84 Protocol developed by IBM The sending apparatus consists of a green lightemitting diode, a lens, a pinhole and mirrors that provide a collimated beam of horizontally polarized light. Next, electronic devices known as Pockels Cells are used to change the original horizontal polarization to any of four standard polarization states under the users control
The receiving apparatus contains a similar Pockels cell, which allows the user to choose the type of polarization he will measure. After the beam passes through hte Pockels Cell, it is split by a calcite prism into two perpendicularly polarized beams, which are directed into two photomultiplier tubes for the purpose of detecting individual photons
Quantum Cryptography
Pros
Cons
Free Space
Being developed for longer distances May be possible to send from ground satellites to space satellites Longest recorded is km, at Los Almos
Summary
Algorithm Example History Process Pros and Cons Open Air Cryptography
Quantum Cryptography
Bibliography
http://world.std.com/~franl/crypto/rsa-guts.html