Quantum cryptography: what is it?
In order to secure and transmit data in a way that cannot be intercepted, quantum cryptography employs the inherent features of quantum physics.
Data is encrypted and protected using cryptography so that only those with the proper secret key may decrypt it. In contrast to conventional cryptographic systems, quantum cryptography uses physics rather than mathematics as the primary component of its security concept.
Quantum cryptography is a system that cannot be broken into without the transmitter or recipient of the message being aware of it.
Data is sent across fiber optic wire using individual light particles, or photons, in quantum cryptography. Binary bits are represented by photons. Quantum physics is a key component of the system's security. These safe areas consist of the following:
A quantum attribute cannot be observed without affecting or upsetting it, particles can exist in more than one location or state at once, and entire particles cannot be replicated.
Any system's quantum state cannot be measured due to these characteristics without causing it to change.
Due to the fact that they possess all the requirements for quantum cryptography, photons are utilized in this technology. They function as information carriers in optical fiber lines and their behavior is well characterized.
How does quantum encryption operate?
Theoretically, quantum cryptography operates by adhering to a 1984 model.
The simulation makes the assumption that Alice and Bob are two individuals who want to securely communicate. Alice starts the communication by delivering a key to Bob. A stream of photons that move in only one direction holds the secret. Every photon is a single bit of information, either a 0 or a 1. But these photons are also oscillating, or vibrating, in addition to their linear motion.
The photons pass through a polarizer before Alice, the sender, starts the transmission. A filter called a polarizer allows certain photons to pass through with the same vibrations while allowing other photons to pass through with a different vibration. The polarized states could be 45 degrees left, 45 degrees right, vertical (1 bit), horizontal (0 bit), or diagonal (45 bits) (0 bit). In any of the schemes she employs, the transmission has one of two polarizations indicating a single bit, either a 0 or a 1.
Now, Bob, the photons are moving from the polarizer to the receiver along an optical fiber. A beam splitter is used in this method to determine each photon's polarization. Bob chooses one polarization at random because he does not know the proper polarization of the photons when he receives the photon key. To determine the polarizer Alice used to send each photon, Alice now compares the tools Bob used to polarize the key. Bob then checks to make sure he used the right polarizer. The sequence that is left after discarding the photons that were read with the incorrect splitter is regarded as the key.
Consider the possibility that Eve, an eavesdropper, is present. With the same equipment as Bob, Eve tries to listen in. Bob, however, has the benefit of conversing with Alice to check the type of polarizer that was applied to each photon, whereas Eve does not. Eve ultimately renders the last key inaccurately.
Bob and Alice would also be aware if Eve was listening in on them. Alice and Bob's expected photon positions would alter as a result of Eve viewing the photon flow.
click here https://shrinke.me/TMhMG for more crypto stuff