CRYPTOGRAPHY
AND
QUANTUM
COMPUTING
Cryptography
• It is the study of secure
communications techniques that allow
only the sender and intended recipient
of a message to view its contents.
• It is closely associated to encryption,
which is the act of scrambling ordinary
text into what's known as ciphertext and
then back again upon arrival.
Basic Terms in Cryptography
• Plain Text
• Cipher Text
• Encryption
• Decryption
• Key
• Hashing
Encryption &
Decryption
Types of
Cryptography
1.SYMMETRIC KEY CRYPTOGRAPHY
2.ASYMMETRIC KEY CRYPTOGRAPHY
SYMMETRIC KEY CRYPTOGRAPHY
It is an encryption system where the
sender and receiver of message use a
single common key to encrypt and decrypt
messages. Symmetric Key Systems are faster
and simpler, but the problem is that
sender and receiver have to somehow
exchange key in a secure manner. The most
popular symmetric key cryptography system
is Data Encryption System(DES).
SYMMETRIC KEY CRYPTOGRAPHY
ASYMMETRIC KEY CRYPTOGRAPHY
Under this system a pair of keys is used
to encrypt and decrypt information. A
public key is used for encryption and a
private key is used for decryption. Public
key and Private Key are different. Even if
the public key is known by everyone the
intended receiver can only decode it
because he alone knows the private key.
ASYMMETRIC KEY CRYPTOGRAPHY
KEYS USED IN
CRYPTOGRAPHY
Public Key
Public key uses asymmetric algorithms that
convert messages into an unreadable format. A
person who has a public key can encrypt the
message intended for a specific receiver. The
receiver with the private key can only decode
the message, which is encrypted by the public
key.
Private Key
The private key is a secret key that is used
to decrypt the message and the party knows it
that exchange message. In the traditional
method, a shared secret key is shared within
communicators to enable encryption and
decryption the message, but if the key is
lost, the system becomes void. To avoid this
weakness, PKI (public key infrastructure)
came into force where a public key is used
along with the private key. PKI enables
internet users to exchange information in a
secure way with the use of a public and
private key.
Comparison
Differentiator Symmetric Key Encryption Asymmetric Key Encryption
1. Symmetric Key vs Asymmetric key
Only one key (symmetric key) is used,
and the same key is used to encrypt
and decrypt the message.
Two different cryptographic keys
(asymmetric keys), called the public and
the private keys, are used for
encryption and decryption.
2. Complexity and Speed of Execution
It’s a simple technique, and because of
this, the encryption process can be
carried out quickly.
It’s a much more complicated process
than symmetric key encryption, and the
process is slower.
3. Length of Keys
The length of the keys used is typically
128 or 256 bits, based on the security
requirement.
The length of the keys is much larger,
e.g., the recommended RSA key size is
2048 bits or higher.
4. Usage
It’s mostly used when large chunks of
data need to be transferred.
It’s used in smaller transactions,
primarily to authenticate and establish a
secure communication channel prior to
the actual data transfer.
5. Security
The secret key is shared. Consequently,
the risk of compromise is higher.
The private key is not shared, and the
overall process is more secure as
compared to symmetric encryption.
Examples of Algorithms
Examples include RC4, AES, DES, 3DES,
etc.
Examples include RSA, Diffie-Hellman,
ECC, etc.
QUANTUM
COMPUTING
What is Quantum :
Quantum is the Latin word for amount
and, in modern understanding,
means the smallest possible discrete
unit of any physical property, such
as energy or matter.
QUANTUM
COMPUTER
What are Quantum Computers :
Quantum computers are machines that
use the properties of quantum
physics to store data and perform
computations. This can be extremely
advantageous for certain tasks where
they could vastly outperform even our
best supercomputers.
HOW
QUANTUM
COMPUTERS
ARE
DIFFERENT
FROM
REGULAR
COMPUTERS
How a regular computer stores information:
Regular computer stores information in a
series of 0’s and 1’s. Different kinds of
information, such as numbers, text, and
images can be represented this way.
Each unit in this series of 0’s and
1’s is called a bit. So, a bit can be set
to either 0 or 1.
HOW
QUANTUM
COMPUTERS
ARE
DIFFERENT
FROM
REGULAR
COMPUTERS
Now, what about quantum computers?
A quantum computer does not use bits to
store information. Instead, it uses
something called qubits. A qubit (or
quantum bit) is the quantum mechanical
analogue of a classical bit which can have
value both 0 and 1 all at one time unlike
a classical bit. This is called
superposition.
Bits and
Qubits
Difference
Classical Bit
Quantum Bit
QUANTUM
SUPERPOSITION
What is Quantum Superposition?
• Superposition is a system that has two
different states that can define it and
it’s possible for it to exist in both.
For example, in physical terms, an
electron has two possible quantum
states: spin up and spin down. When an
electron is in superposition, it is
both up and down at once – it is a
complex combination of both.
• The illustration below shows, as an
example, a ball that can be either
outside or inside a box, or in a
quantum superposition of the two states
simultaneously (with the usual
notations used by the physicists).
QUANTUM
ENTANGLEMENT
What is Quantum Entanglement?
One of the other counter-intuitive
phenomena in quantum physics is
entanglement. A pair or group of
particles is entangled when the quantum
state of each particle cannot be
described independently of the quantum
state of the other particle(s). The
quantum state of the system as a whole
can be described; it is in a definite
state, although the parts of the system
are not.
Confused..????
Don’t Worry, we will understand this
with an example in next slide !
QUANTUM
ENTANGLEMENT
By applying the principle of superposition to
a system composed of several objects, each of
which can be found in several possible
states, one can obtain very strange quantum
states called entangled states.
In the example below the system consists of a
blue ball and a red ball each being able to
be outside (0) or inside (1) a box. The
superposed state in which the balls are
simultaneously both outside and both inside
the box is difficult to represent it is at
the same time very indeterminate (each of the
balls can be found either inside or outside)
but at the same time very determined because
the balls are for sure at the same place.
This kind of entangled state is a resource
widely used in quantum technologies.
QUANTUM
TELEPORTATION
What is Quantum Teleportation ?
Quantum teleportation is a technique
used to transfer information on a
quantum level, usually from one particle
to another.
It may be defined as a process by which
a qubit (the basic unit of quantum
information) can be transmitted from one
location to another, without the qubit
actually being transmitted through
space. It is useful for quantum
information processing and quantum
communication
Quantum teleportation transfers info b/w
2 points without any physical medium,
say for example – a radio wave, passing
through space.
This means it can’t be intercepted at
any cost and will provide a basis for
perfectly secure mass communications,
super-fast quantum computers and,
eventually, a quantum internet far more
powerful than the one we have today.
ADVANTAGES OF
QUANTUM
COMPUTING
Advantages of Quantum Computing
The main advantage of quantum computing is it can execute any task
very faster when compared to the classical computer, generally the atoms
changes very faster in case of the traditional computing whereas in
quantum computing it changes even more faster. But all the tasks can’t be
done better by quantum computing when compared to traditional
computer.
Applications :
• Machine Learning & Artificial Intelligence
• Computational Chemistry
• Development & Drug Design
• Cryptography & Cybersecurity
• Financial Modelling
Reference : https://www.merementor.com/blog/applications-of-
quantum-computing
DISADVANTAGES
OF QUANTUM
COMPUTING
Disadvantages of Quantum Computing
1. The research for this problem is still continuing the effort applied to
identify a solution for this problem that has no positive progress.
2. Qubits are not digital bits of the day thus they cannot use as
conventional error correction.
3. The main disadvantage of Quantum computing is the technology
required to implement a quantum computer is not available at present
days.
4. The minimum energy requirement for quantum logical operations is
five times that of classical computers.
5. Quantum CPU will have efficiency and heating problems of its own.
6. When a measurement of any type is made to a quantum system,
decoherence is totally broken down and the wave function collapses
into a single state.
Quantum
Computing: Threat
to Cybersecurity ?
Speed Affects CyberSecurity
Some encryption algorithms are thought to be unbreakable, except the
brute-force attacks(try all possible keys to identify the one that
decrypts data back to a readable form) . The American
Scientists states, “the world’s fastest supercomputer would need
trillions of years to find the right key.” In contrast, Grover’s
Algorithm, a quantum computing method, simplifies and speeds up
the cracking process. A classical computer will take
approximately 5 seconds to get the result, whereas a
quantum computer will take 0.005 seconds to get the result.
Quantum
Computing Power
Malware Attacks
• Today, hackers can adopt advanced technologies, such as machine
learning techniques, to develop and distribute deadly forms of
malware. What can a quantum computer offer to criminals running
massive data sets for machine learning?
• Threat actors can leverage the strengths of quantum computing to
create a novel approach to breach cybersecurity. Such activities
could be too computationally expensive on classical computers, but
with a quantum computer, the hacker can quickly analyze datasets
and proceed to launch a sophisticated attack on a large population
of networks and devices.
Reference : https://cisomag.eccouncil.org/quantum-
computing/
Thank You

More Related Content

PDF
Quantum Cryptography/QKD
PPTX
Naman quantum cryptography
PPTX
Quantum cryptography
PDF
Introduction to Quantum Computing
DOC
Quantum cryptography
PPTX
Quantum computing
PPTX
Quantum computing
PDF
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Cryptography/QKD
Naman quantum cryptography
Quantum cryptography
Introduction to Quantum Computing
Quantum cryptography
Quantum computing
Quantum computing
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...

What's hot (20)

PPTX
Quantum cryptography
PPTX
Quantum Computing Explained
PDF
Quantum Key Distribution
PDF
Quantum Computation: What is it and Why?
ODP
Quantum Cryptography - Quantum Coin Tossing
PPT
quantum cryptography
PPT
Quantum cryptography
PPT
Fundamentals of Quantum Computing
PPTX
Information and data security pseudorandom number generation and stream cipher
PPTX
Quantum Cryptography & Key Distribution.pptx
PPTX
Presentation quantum computers
PPTX
Shor’s algorithm the ppt
PDF
Quantum computing
PPTX
Quantum computer
PPTX
quantumcrypto
PDF
Zenbaki hamartarrak
PPTX
Quantum Computing and AI
PDF
Quantum Computing
PPTX
Quantum Computing Basics
PDF
Antzinaroa
Quantum cryptography
Quantum Computing Explained
Quantum Key Distribution
Quantum Computation: What is it and Why?
Quantum Cryptography - Quantum Coin Tossing
quantum cryptography
Quantum cryptography
Fundamentals of Quantum Computing
Information and data security pseudorandom number generation and stream cipher
Quantum Cryptography & Key Distribution.pptx
Presentation quantum computers
Shor’s algorithm the ppt
Quantum computing
Quantum computer
quantumcrypto
Zenbaki hamartarrak
Quantum Computing and AI
Quantum Computing
Quantum Computing Basics
Antzinaroa
Ad

Similar to Cryptography & Quantum Computing.pptx (20)

PPTX
Quantum Cryptography
PPTX
Quantum Computing vs Encryption: A Battle to Watch Out for
PPTX
Quantum-Cryptography-Securing-the-Future-of-Information.pptx
PDF
ITNW 2164 ResearchPaper
PPTX
Quantum computer in cryptography
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPTX
bhanu.pptx
PPTX
Quantum Computing and its security implications
DOCX
CA_final_paper
PPTX
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PDF
Quantum Computing Seminar Presenatation(Simple format)
PDF
Criptografía cuántica - fundamentos, productos y empresas
PDF
Cryptography And Embedded Systems Used
PPTX
quantum computing22.pptx
PPTX
quantum computing basics roll no 15.pptx
PDF
The Quantum Era & Quantum Key Distribution
PPTX
Aditya kulshreshtha, (QUANTUM COMPUTING)
PDF
Why Should You Pay Attention To Quantum Computing?
Quantum Cryptography
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum-Cryptography-Securing-the-Future-of-Information.pptx
ITNW 2164 ResearchPaper
Quantum computer in cryptography
Quantum Computing and Blockchain: Facts and Myths
bhanu.pptx
Quantum Computing and its security implications
CA_final_paper
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
Exploring Quantum Cryptography: Next-Generation Security Protocols
Quantum Computing Seminar Presenatation(Simple format)
Criptografía cuántica - fundamentos, productos y empresas
Cryptography And Embedded Systems Used
quantum computing22.pptx
quantum computing basics roll no 15.pptx
The Quantum Era & Quantum Key Distribution
Aditya kulshreshtha, (QUANTUM COMPUTING)
Why Should You Pay Attention To Quantum Computing?
Ad

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Flame analysis and combustion estimation using large language and vision assi...
DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
STKI Israel Market Study 2025 version august
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Modernising the Digital Integration Hub
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
2018-HIPAA-Renewal-Training for executives
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
sbt 2.0: go big (Scala Days 2025 edition)
Hindi spoken digit analysis for native and non-native speakers
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Flame analysis and combustion estimation using large language and vision assi...
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
The influence of sentiment analysis in enhancing early warning system model f...
Custom Battery Pack Design Considerations for Performance and Safety
STKI Israel Market Study 2025 version august
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A review of recent deep learning applications in wood surface defect identifi...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Consumable AI The What, Why & How for Small Teams.pdf
Modernising the Digital Integration Hub
sustainability-14-14877-v2.pddhzftheheeeee
Module 1.ppt Iot fundamentals and Architecture
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx

Cryptography & Quantum Computing.pptx

  • 2. Cryptography • It is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. • It is closely associated to encryption, which is the act of scrambling ordinary text into what's known as ciphertext and then back again upon arrival.
  • 3. Basic Terms in Cryptography • Plain Text • Cipher Text • Encryption • Decryption • Key • Hashing
  • 5. Types of Cryptography 1.SYMMETRIC KEY CRYPTOGRAPHY 2.ASYMMETRIC KEY CRYPTOGRAPHY
  • 6. SYMMETRIC KEY CRYPTOGRAPHY It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler, but the problem is that sender and receiver have to somehow exchange key in a secure manner. The most popular symmetric key cryptography system is Data Encryption System(DES).
  • 8. ASYMMETRIC KEY CRYPTOGRAPHY Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public key and Private Key are different. Even if the public key is known by everyone the intended receiver can only decode it because he alone knows the private key.
  • 10. KEYS USED IN CRYPTOGRAPHY Public Key Public key uses asymmetric algorithms that convert messages into an unreadable format. A person who has a public key can encrypt the message intended for a specific receiver. The receiver with the private key can only decode the message, which is encrypted by the public key. Private Key The private key is a secret key that is used to decrypt the message and the party knows it that exchange message. In the traditional method, a shared secret key is shared within communicators to enable encryption and decryption the message, but if the key is lost, the system becomes void. To avoid this weakness, PKI (public key infrastructure) came into force where a public key is used along with the private key. PKI enables internet users to exchange information in a secure way with the use of a public and private key.
  • 11. Comparison Differentiator Symmetric Key Encryption Asymmetric Key Encryption 1. Symmetric Key vs Asymmetric key Only one key (symmetric key) is used, and the same key is used to encrypt and decrypt the message. Two different cryptographic keys (asymmetric keys), called the public and the private keys, are used for encryption and decryption. 2. Complexity and Speed of Execution It’s a simple technique, and because of this, the encryption process can be carried out quickly. It’s a much more complicated process than symmetric key encryption, and the process is slower. 3. Length of Keys The length of the keys used is typically 128 or 256 bits, based on the security requirement. The length of the keys is much larger, e.g., the recommended RSA key size is 2048 bits or higher. 4. Usage It’s mostly used when large chunks of data need to be transferred. It’s used in smaller transactions, primarily to authenticate and establish a secure communication channel prior to the actual data transfer. 5. Security The secret key is shared. Consequently, the risk of compromise is higher. The private key is not shared, and the overall process is more secure as compared to symmetric encryption. Examples of Algorithms Examples include RC4, AES, DES, 3DES, etc. Examples include RSA, Diffie-Hellman, ECC, etc.
  • 12. QUANTUM COMPUTING What is Quantum : Quantum is the Latin word for amount and, in modern understanding, means the smallest possible discrete unit of any physical property, such as energy or matter.
  • 13. QUANTUM COMPUTER What are Quantum Computers : Quantum computers are machines that use the properties of quantum physics to store data and perform computations. This can be extremely advantageous for certain tasks where they could vastly outperform even our best supercomputers.
  • 14. HOW QUANTUM COMPUTERS ARE DIFFERENT FROM REGULAR COMPUTERS How a regular computer stores information: Regular computer stores information in a series of 0’s and 1’s. Different kinds of information, such as numbers, text, and images can be represented this way. Each unit in this series of 0’s and 1’s is called a bit. So, a bit can be set to either 0 or 1.
  • 15. HOW QUANTUM COMPUTERS ARE DIFFERENT FROM REGULAR COMPUTERS Now, what about quantum computers? A quantum computer does not use bits to store information. Instead, it uses something called qubits. A qubit (or quantum bit) is the quantum mechanical analogue of a classical bit which can have value both 0 and 1 all at one time unlike a classical bit. This is called superposition.
  • 17. QUANTUM SUPERPOSITION What is Quantum Superposition? • Superposition is a system that has two different states that can define it and it’s possible for it to exist in both. For example, in physical terms, an electron has two possible quantum states: spin up and spin down. When an electron is in superposition, it is both up and down at once – it is a complex combination of both. • The illustration below shows, as an example, a ball that can be either outside or inside a box, or in a quantum superposition of the two states simultaneously (with the usual notations used by the physicists).
  • 18. QUANTUM ENTANGLEMENT What is Quantum Entanglement? One of the other counter-intuitive phenomena in quantum physics is entanglement. A pair or group of particles is entangled when the quantum state of each particle cannot be described independently of the quantum state of the other particle(s). The quantum state of the system as a whole can be described; it is in a definite state, although the parts of the system are not. Confused..???? Don’t Worry, we will understand this with an example in next slide !
  • 19. QUANTUM ENTANGLEMENT By applying the principle of superposition to a system composed of several objects, each of which can be found in several possible states, one can obtain very strange quantum states called entangled states. In the example below the system consists of a blue ball and a red ball each being able to be outside (0) or inside (1) a box. The superposed state in which the balls are simultaneously both outside and both inside the box is difficult to represent it is at the same time very indeterminate (each of the balls can be found either inside or outside) but at the same time very determined because the balls are for sure at the same place. This kind of entangled state is a resource widely used in quantum technologies.
  • 20. QUANTUM TELEPORTATION What is Quantum Teleportation ? Quantum teleportation is a technique used to transfer information on a quantum level, usually from one particle to another. It may be defined as a process by which a qubit (the basic unit of quantum information) can be transmitted from one location to another, without the qubit actually being transmitted through space. It is useful for quantum information processing and quantum communication Quantum teleportation transfers info b/w 2 points without any physical medium, say for example – a radio wave, passing through space. This means it can’t be intercepted at any cost and will provide a basis for perfectly secure mass communications, super-fast quantum computers and, eventually, a quantum internet far more powerful than the one we have today.
  • 21. ADVANTAGES OF QUANTUM COMPUTING Advantages of Quantum Computing The main advantage of quantum computing is it can execute any task very faster when compared to the classical computer, generally the atoms changes very faster in case of the traditional computing whereas in quantum computing it changes even more faster. But all the tasks can’t be done better by quantum computing when compared to traditional computer. Applications : • Machine Learning & Artificial Intelligence • Computational Chemistry • Development & Drug Design • Cryptography & Cybersecurity • Financial Modelling Reference : https://www.merementor.com/blog/applications-of- quantum-computing
  • 22. DISADVANTAGES OF QUANTUM COMPUTING Disadvantages of Quantum Computing 1. The research for this problem is still continuing the effort applied to identify a solution for this problem that has no positive progress. 2. Qubits are not digital bits of the day thus they cannot use as conventional error correction. 3. The main disadvantage of Quantum computing is the technology required to implement a quantum computer is not available at present days. 4. The minimum energy requirement for quantum logical operations is five times that of classical computers. 5. Quantum CPU will have efficiency and heating problems of its own. 6. When a measurement of any type is made to a quantum system, decoherence is totally broken down and the wave function collapses into a single state.
  • 23. Quantum Computing: Threat to Cybersecurity ? Speed Affects CyberSecurity Some encryption algorithms are thought to be unbreakable, except the brute-force attacks(try all possible keys to identify the one that decrypts data back to a readable form) . The American Scientists states, “the world’s fastest supercomputer would need trillions of years to find the right key.” In contrast, Grover’s Algorithm, a quantum computing method, simplifies and speeds up the cracking process. A classical computer will take approximately 5 seconds to get the result, whereas a quantum computer will take 0.005 seconds to get the result.
  • 24. Quantum Computing Power Malware Attacks • Today, hackers can adopt advanced technologies, such as machine learning techniques, to develop and distribute deadly forms of malware. What can a quantum computer offer to criminals running massive data sets for machine learning? • Threat actors can leverage the strengths of quantum computing to create a novel approach to breach cybersecurity. Such activities could be too computationally expensive on classical computers, but with a quantum computer, the hacker can quickly analyze datasets and proceed to launch a sophisticated attack on a large population of networks and devices. Reference : https://cisomag.eccouncil.org/quantum- computing/