SlideShare a Scribd company logo
Quantum
Cryptography
Presented by :
( RB.Aditya
L.Ramkumar )
Exploring secure communication using
quantum technology.
Introduction
• The digital era demands robust security for °
sensitive data.Traditional
• cryptography is threatened by advances in
quantum computing
•Quantum cryptography offers a fundamentally
secure alternative
Abstract
This project focuses on using Quantum Key
Distribution (QKD) for secure communication.
Unlike traditional cryptography, quantum
cryptography relies on quantum mechanics,
making it highly secure. Using Qiskit, the project
simulates the BB84 protocol to show how
quantum states can securely exchange
encryption keys.
Key principle of quantum
cryptography
• Superposition: Quantum bits (qubits) exist in
multiple states simultaneously. • Entanglement:
Linked particles instantly affect each other,
regardless of distance. • No-Cloning Theorem:
Quantum information cannot be copied without
detection.
Quantum key distribution (QKD)
• Quantum Key Distribution
(QKD)Allows two parties to generate a
shared secret key,
• Most common protocol: BB84.
• Any eavesdropping attempt disturbs
the system and is detectable
Working
(BB84 PROTOCOL)
How QKD Works (BB84 Protocol) Sender (Alice)
encodes bits in photon polarization. Receiver
(Bob) measures photons using random bases.
Alice and Bob compare bases over a public
channel. Matching results form the secret key;
mismatches are discarded. Eavesdropping
introduces detectable errors.
Advantage of quantum
cryptography
• Security: Based on physical laws.
• Detection: Any interception is immediately
noticeable.
• Resistant to quantum computer attacks
Challenges and limitations
• High implementation costs.Limited
transmission distance (attenuation in
optical fibers)
• .Integration with existing
communication infrastructure.
• transmission distance (attenuation in
optical fibers).
• Integration with existing
communication infrastructure
• Requires specialized hardwareRequires
specialized hardwar.
Real world application
•Secure government and military
communications.
•Financial transactions and banking
.
•Healthcare data protection.
•Quantum networks and the quantum
internet.
•Ongoing research to extend range
and reduce costs.
•Development of quantum
repeaters and satellite QKD.
•Integration with classical networks
for hybrid security solutions.
•Combine with post quantum
cryptography.
Future
prospects
Conclusions
Quantum cryptography is a promising
solution for secure
communication.Overcomes
vulnerabilities of classical encryption.Key
to safeguarding data in the quantum
computing era.
Refrence
Computer Fraud & Security Journal.
(2024).Bennett University Blog.
(2024).SlideServe Quantum Cryptography
PPT. (2025).IJRCAIT Journal Article.
(2024).Quantum Communications Hub.
(2025).
CREDITS: This presentation template was created by Slidesgo,
and includes icons, infographics & images by Freepik
Thank you!
Do you have any questions?

More Related Content

PPTX
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
PDF
namanquantumcryptography-150820161809-lva1-app6892.pdf
PPTX
Naman quantum cryptography
PPT
Quantum cryptography a modern cryptographic security
PPTX
QUANTUM CRYPTOGRAPHY. Ppt for seminar ppt x
PPTX
Cryptography - Assignment III - Quantum.pptx
PPTX
Cryptopresentationfinal
PPTX
Quantum cryptography
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
namanquantumcryptography-150820161809-lva1-app6892.pdf
Naman quantum cryptography
Quantum cryptography a modern cryptographic security
QUANTUM CRYPTOGRAPHY. Ppt for seminar ppt x
Cryptography - Assignment III - Quantum.pptx
Cryptopresentationfinal
Quantum cryptography

Similar to secure communication using quantum cryptography[1].pptx (20)

PPTX
Shahzad quantum cryptography
PDF
quantumcryptography-180425230158.pdf
PPTX
Quantum cryptography
PDF
Quantum Cryptography and its Applications
PPTX
quantumcrypto
PPTX
Quantum Cryptography
PPT
Quantum cryptography data
PPTX
Quantum-Cryptography-Securing-the-Future-of-Information.pptx
PPTX
Quantum cryptography
PPTX
Quantum cryptography
PPT
quantum cryptography introduction for understanding
PDF
Quantum Key Distribution
PPT
Quantum cryptography
PDF
IRJET- Quantum Key Distribution
PPTX
Quantum Cryptography presentation
PDF
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
PDF
Criptografía cuántica - fundamentos, productos y empresas
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PPTX
Quantum Cryptography & Key Distribution.pptx
PDF
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Shahzad quantum cryptography
quantumcryptography-180425230158.pdf
Quantum cryptography
Quantum Cryptography and its Applications
quantumcrypto
Quantum Cryptography
Quantum cryptography data
Quantum-Cryptography-Securing-the-Future-of-Information.pptx
Quantum cryptography
Quantum cryptography
quantum cryptography introduction for understanding
Quantum Key Distribution
Quantum cryptography
IRJET- Quantum Key Distribution
Quantum Cryptography presentation
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
Criptografía cuántica - fundamentos, productos y empresas
Exploring Quantum Cryptography: Next-Generation Security Protocols
Quantum Cryptography & Key Distribution.pptx
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Ad

Recently uploaded (20)

PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PPTX
Artificial Intelligence
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Current and future trends in Computer Vision.pptx
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Fundamentals of Mechanical Engineering.pptx
737-MAX_SRG.pdf student reference guides
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Visual Aids for Exploratory Data Analysis.pdf
Exploratory_Data_Analysis_Fundamentals.pdf
Artificial Intelligence
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Safety Seminar civil to be ensured for safe working.
Nature of X-rays, X- Ray Equipment, Fluoroscopy
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Fundamentals of safety and accident prevention -final (1).pptx
86236642-Electric-Loco-Shed.pdf jfkduklg
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Current and future trends in Computer Vision.pptx
Ad

secure communication using quantum cryptography[1].pptx

  • 1. Quantum Cryptography Presented by : ( RB.Aditya L.Ramkumar ) Exploring secure communication using quantum technology.
  • 2. Introduction • The digital era demands robust security for ° sensitive data.Traditional • cryptography is threatened by advances in quantum computing •Quantum cryptography offers a fundamentally secure alternative
  • 3. Abstract This project focuses on using Quantum Key Distribution (QKD) for secure communication. Unlike traditional cryptography, quantum cryptography relies on quantum mechanics, making it highly secure. Using Qiskit, the project simulates the BB84 protocol to show how quantum states can securely exchange encryption keys.
  • 4. Key principle of quantum cryptography • Superposition: Quantum bits (qubits) exist in multiple states simultaneously. • Entanglement: Linked particles instantly affect each other, regardless of distance. • No-Cloning Theorem: Quantum information cannot be copied without detection.
  • 5. Quantum key distribution (QKD) • Quantum Key Distribution (QKD)Allows two parties to generate a shared secret key, • Most common protocol: BB84. • Any eavesdropping attempt disturbs the system and is detectable
  • 6. Working (BB84 PROTOCOL) How QKD Works (BB84 Protocol) Sender (Alice) encodes bits in photon polarization. Receiver (Bob) measures photons using random bases. Alice and Bob compare bases over a public channel. Matching results form the secret key; mismatches are discarded. Eavesdropping introduces detectable errors.
  • 7. Advantage of quantum cryptography • Security: Based on physical laws. • Detection: Any interception is immediately noticeable. • Resistant to quantum computer attacks
  • 8. Challenges and limitations • High implementation costs.Limited transmission distance (attenuation in optical fibers) • .Integration with existing communication infrastructure. • transmission distance (attenuation in optical fibers). • Integration with existing communication infrastructure • Requires specialized hardwareRequires specialized hardwar.
  • 9. Real world application •Secure government and military communications. •Financial transactions and banking . •Healthcare data protection. •Quantum networks and the quantum internet.
  • 10. •Ongoing research to extend range and reduce costs. •Development of quantum repeaters and satellite QKD. •Integration with classical networks for hybrid security solutions. •Combine with post quantum cryptography. Future prospects
  • 11. Conclusions Quantum cryptography is a promising solution for secure communication.Overcomes vulnerabilities of classical encryption.Key to safeguarding data in the quantum computing era. Refrence Computer Fraud & Security Journal. (2024).Bennett University Blog. (2024).SlideServe Quantum Cryptography PPT. (2025).IJRCAIT Journal Article. (2024).Quantum Communications Hub. (2025).
  • 12. CREDITS: This presentation template was created by Slidesgo, and includes icons, infographics & images by Freepik Thank you! Do you have any questions?