Hello friends, I hope you all are doing great. Today I am going to discuss and explain to you, Quantum Cryptography, in this article, you will learn what Quantum cryptography is and how the data was stored and transmitted by the first generation computers from one device to another.It's going to be a long series and today, I am posting its first lecture, so I'll only cover the basics. I will briefly give you an overview of its history & we will understand How it has evolved in the past and now became an important part of digital world. So, let's get started:
Quantum CryptographyWe know that digital data is always stored in bit format i.e. 0's and 1's but first generation computers stored the data using the method of Punch Tape (you can find the illustration below):As you can see in above image, we have a pattern of punch holes. Here, holes are representing 0s and the plain surfaces are representing 1s. This type of data was authentic & reliable and there was almost zero percent chance of the data to get destroyed. Then we entered the evolution of Hard Disk, which stores the data to bits in the electromagnetic form, which actually stores in the form of 1s and 0s. If you look at the picture carefully, you will see they have opposite polarity. In the hard disk, data is not as secured as in punch tape as you may getIn this 21st century, we are using Quantum Computer which is known as Q-bit. It exists in the form of superposition with the algorithms. So the data will be stored and transmitted through supercomputers.
CryptographyAs the means of communication are getting smarter, the security of sensitive or private data and information has become the highest risk. Therefore, the goal is to transmit the data and information safely from one server to another, this method is known as Cryptography.In this method, the data and information are hidden between two servers, in a way that any third party/hacker unables to access them in an unauthorized way. (As we can see nowadays in our Whatsapp, the chats are end-to-end encrypted). We click it to disable the access of any third party to our data and to ensure that our chats are safe.The cryptography can function through various methods to secure the data. The easiest philosophy is that both the sender and receiver have a codebook. So the sender, let's name it Bob and the receiver is Alice:
- Bob wants to send some information "A" to the receiver. ( Let's suppose, "A" is equal to 18) .
- We pick a code from our codebook which is 93, we will add this code in our data i.e. 18+93 = 111 and then we will subtract 100 from this product and we will get 11.
- We send this 11 to the receiver, so we have done the data encoding.
- The receiver should know the same pattern as he has the codebook and it must know that it should perform the reverse action.
- It has to subtract the code 93 from 11, i.e. 11-93= -82, then will need to add 100 to it i.e. -82+100=18 and 18 is our data "A".
History[dt_gap height="10" /]We will learn the historical background that how in the early generation the cryptography was functioned and ciphered.
- It's about 400 BC when a human sent data from one point to another, using the method of scytale which was called Permutations.
Ceaser Cipher Substitution[dt_gap height="10" /]Here I interpret about Greeks, Julius Ceaser produced a cipher called substitution method. In this method, we have A to Z characters and we will stimulate a circular cycle through it. As the AB and C will be shifted at the end. So we shifted the ABCD to three places. Now we get the new encryption scheme that A is represented by D, B by E, C by F and respectively (find the pattern in the illustration). Now the receiver must know how many places A, B, C, and D have to be shifted, then he will be able to retrieve the data. This code of data was easily deciphered by a Muslim scientist, AL Kindi, however, if you look at the data, it is almost impossible to break the code of this data, but Al Kindi deciphered it with a single trick. According to him, he described that if we have a book, see how many times the character E is placed. He finds that in every hundred alphabets E holds twelve places and the T keeps 9 places then A and O and so on. If you see any book of English, you will find the same probability distribution.Suppose you have replaced E from J and you have sent the data.so the C which has the data will determine which word has been included numerous times and the probability of the letter J will be defined. The probability of the letter J will be 0.12 which makes the fraction of 12/100 then it will be able to detect that the letter E has been replaced by letter J. The same pattern will be followed by the next letter i.e. T. the C can easily decipher all the letters replacements through reverse engineering method, so Al-Kindi was the code breaker he deciphered the codes of Julius Ceaser.To break any code you are required a massive amount of encrypted data, the more you have the encrypted data the easier it will be for you to reproduce the codebook. The Eve is capable of accessing the data based on encryption it contains.
Alberti encryption disc[dt_gap height="10" /]Let us have a look at another cipher technique which is known as Alberti encryption disc. It was founded by Leon Battista Alberti. The alphabets were placed against another disc which has different characters as well. ( illustration below), but if we rotate the upper disc and shift the Letters, all the characters will be facing different letters, for example, A will be facing e, B will be facing g, C will face k and all the alphabets face their characters respectively. The receiver should know how many times it has been shifted, whether it is shifted to three points, four points or ten points. Therefore the receiver will use the reverse engineering method and will be able to decipher your code.Suppose, if I want to send “SELL” then I need to:
- rotated the disc seven times then S will be replaced by Z,
- same as for E, I will rotate it till fourteen points, then E will be replaced by S,
- the third rotation will occur nineteen in steps for the letter L and L will be replaced by the character E,
- then again I will have to rotate it in seven steps, but this time we will have the character S in replacement of L.