Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Quantum cryptography

No description

nam yenjai

on 30 August 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Quantum cryptography

Interesting facts:
The most well known and developed application of quantum cryptography is quantum key distribution (QKD), which is the process of using quantum communication to make up a shared key between two parties (liz and sam, for example) without a third party luis) learning anything about that key, even if Eve can eavesdrop on all communication between Alice and Bob.
What is it?
Quantum cryptography is the only known method for transmitting a secret key over distance that is secure in principle and based on the laws of physics. It enables two group/people to produce and shared random secret key known only to them.
Advantages of Quantum cryptography:
Virtually un-hackable
Simple to use
Less resources needed to maintain it
Impossible to copy data encoded in a quantum state
Quantum cryptography
How it works?
Keeping your secrets secret.
Disadvantages of Quantum cryptography:
The signal is currently limited to 90 miles
Could replace a lot of jobs
Quantum cryptography uses photons to transmit a key. Once the key is transmitted, coding and encoding using the normal secret-key method can take place.
Each type of a photon’s spin represents one piece of information — usually a 1 or a 0, for binary code. This code uses strings of 1s and 0s to create a joined message. For example, 11100100110 could correspond with h-e-l-l-o. So a binary code can be assigned to each photon — for example, a photon that has a vertical spin ( | ) can be assigned a 1. Liz can send her photons through randomly chosen filters and record the polarization of each photon. She will then know what photon polarizations Sam should receive.
Full transcript