Presentation-1
Presentation-1
QUANTUM CRYPTOGRAPHY
GROUP MEMBERS :
• Asha Choudhary H
• SivaSankari B
CRYPTOGRAPHY :
• Definition : The practice of securing information
through Encoding techniques .
2. Measurement by Receiver
3. Key Comparison
4. Key Finalization
QUANTUM
CRYPTOGRAPHY
QUANTUM
CRYPTOGRAPHY
Drawbacks
:
• Photon Loss Problem
• Man-in-the-middle Attack
• Decoy state
• Error correction
Implementation :
• Example : secure communication between two cities
using decoy state protocol.
key_length = 100
decoy_probability = 0.2
error_threshold = 0.1
repeater_count = 3
satellite_mode = True
if satellite_mode:
print(" Satellite QKD Enabled: Entangled photons are distributed globally.")
bob_basis = alice_basis
Implementation :
bob_measurements = quantum_repeater_correction( np.where(alice_basis ==
bob_basis, alice_photons, np.random.randint(2, size=key_length)),
repeater_count)
def hash_function(key):
key_str = ''.join(map(str, key))
hashed = hashlib.sha256(key_str.encode()).hexdigest()
return hashed[:16]
secure_final_key = hash_function(bob_key)
Implementation :
plt.figure(figsize=(10, 4))
plt.plot(alice_key[:50], 'bo-', label="Alice's Key")
plt.plot(bob_measurements[:50], 'rx-', label="Bob's Key (Before Correction)")
plt.plot(bob_key[:50], 'g*-', label="Bob's Key (After Correction)")
plt.xlabel("Bit Index")
plt.ylabel("Bit Value (0 or 1)")
plt.title("Quantum Key Transmission with Error Correction")
plt.legend()
plt.grid()
plt.show()
Implementation :
print("🔬 Simulating Photon Transmission...")
for i in range(10):
time.sleep(0.5)
print(f"📡 Transmitting photon {i+1}...", end="\r")