Hello friends, I hope you all are doing great. Today I am going to discuss and explain to you, Quantum Cryptography, in this article, you will learn what Quantum cryptography is and how the data was stored and transmitted by the first generation computers from one device to another. It's going to be a long series and today, I am posting its first lecture, so I'll only cover the basics. I will briefly give you an overview of its history & we will understand How it has evolved in the past and now became an important part of digital world. So, let's get started:

#### Quantum Cryptography

We know that digital data is always stored in bit format i.e. 0's and 1's but first generation computers stored the data using the method of Punch Tape (you can find the illustration below): As you can see in above image, we have a pattern of punch holes. Here, holes are representing 0s and the plain surfaces are representing 1s. This type of data was authentic & reliable and there was almost zero percent chance of the data to get destroyed. Then we entered the evolution of Hard Disk, which stores the data to bits in the electromagnetic form, which actually stores in the form of 1s and 0s. If you look at the picture carefully, you will see they have opposite polarity. In the hard disk, data is not as secured as in punch tape as you may get In this 21st century, we are using Quantum Computer which is known as Q-bit. It exists in the form of superposition with the algorithms. So the data will be stored and transmitted through supercomputers.

#### Cryptography

As the means of communication are getting smarter, the security of sensitive or private data and information has become the highest risk. Therefore, the goal is to transmit the data and information safely from one server to another, this method is known as Cryptography. In this method, the data and information are hidden between two servers, in a way that any third party/hacker unables to access them in an unauthorized way. (As we can see nowadays in our Whatsapp, the chats are end-to-end encrypted). We click it to disable the access of any third party to our data and to ensure that our chats are safe. The cryptography can function through various methods to secure the data. The easiest philosophy is that both the sender and receiver have a codebook. So the sender, let's name it Bob and the receiver is Alice:
• Bob wants to send some information "A" to the receiver. ( Let's suppose, "A" is equal to 18) .
• We pick a code from our codebook which is 93, we will add this code in our data i.e. 18+93 = 111 and then we will subtract 100 from this product and we will get 11.
• We send this 11 to the receiver, so we have done the data encoding.
• The receiver should know the same pattern as he has the codebook and it must know that it should perform the reverse action.
• It has to subtract the code 93 from 11, i.e. 11-93= -82, then will need to add 100 to it i.e. -82+100=18 and 18 is our data "A".
Now suppose, if any third party, lets name it Eve, gets the information 11, it is unable to reproduce the data unless it has the codebook and the same number. Let me inform you if we start transmitting the data and information in mass quantity, it will become easy for Eve to start predicting the codebook and how the data is being ciphered and it will be able to collect the data and make its codebook. The same method is used by hackers who try to access the data. They have supercomputers to operate such tasks and they try to reproduce the codebook through reverse engineering.
##### History
We will learn the historical background that how in the early generation the cryptography was functioned and ciphered.
• It's about 400 BC when a human sent data from one point to another, using the method of scytale which was called Permutations.
so if I have a message "ABC", I can write it in a few forms such as BAC, CAB, ACB, and our receiver must know the method of our permutation, so if you want to send a message " SEND HELP" (Illustration below), You can find how the message will appear after permutation and the receiver will know how to decipher it, this pattern was known as scytale.
##### Ceaser Cipher Substitution
Here I interpret about Greeks, Julius Ceaser produced a cipher called substitution method. In this method, we have A to Z characters and we will stimulate a circular cycle through it. As the AB and C will be shifted at the end. So we shifted the ABCD to three places. Now we get the new encryption scheme that A is represented by D, B by E, C by F and respectively (find the pattern in the illustration). Now the receiver must know how many places A, B, C, and D have to be shifted, then he will be able to retrieve the data. This code of data was easily deciphered by a Muslim scientist, AL Kindi, however, if you look at the data, it is almost impossible to break the code of this data, but Al Kindi deciphered it with a single trick. According to him, he described that if we have a book, see how many times the character E is placed. He finds that in every hundred alphabets E holds twelve places and the T keeps 9 places then A and O and so on. If you see any book of English, you will find the same probability distribution. Suppose you have replaced E from J and you have sent the data.so the C which has the data will determine which word has been included numerous times and the probability of the letter J will be defined. The probability of the letter J will be 0.12 which makes the fraction of 12/100 then it will be able to detect that the letter E has been replaced by letter J. The same pattern will be followed by the next letter i.e. T. the C can easily decipher all the letters replacements through reverse engineering method, so Al-Kindi was the code breaker he deciphered the codes of Julius Ceaser. To break any code you are required a massive amount of encrypted data, the more you have the encrypted data the easier it will be for you to reproduce the codebook. The Eve is capable of accessing the data based on encryption it contains.
##### Alberti encryption disc
Let us have a look at another cipher technique which is known as Alberti encryption disc. It was founded by Leon Battista Alberti. The alphabets were placed against another disc which has different characters as well. ( illustration below), but if we rotate the upper disc and shift the Letters, all the characters will be facing different letters, for example, A will be facing e, B will be facing g, C will face k and all the alphabets face their characters respectively. The receiver should know how many times it has been shifted, whether it is shifted to three points, four points or ten points. Therefore the receiver will use the reverse engineering method and will be able to decipher your code. Suppose, if I want to send “SELL” then I need to:
• rotated the disc seven times then S will be replaced by Z,
• same as for E, I will rotate it till fourteen points, then E will be replaced by S,
• the third rotation will occur nineteen in steps for the letter L and L will be replaced by the character E,
• then again I will have to rotate it in seven steps, but this time we will have the character S in replacement of L.
Now you can view, as L wasn't represented by code A, the first L is coded by E and the second L is coded by S, which is much difficult to decipher or to reproduce, on the other hand, I need to tell the decoder or the receiver, 7, 14, 19, that you have to decode it, with this pattern. This code was broken by Charles Babbage, he pioneered that we can decode an Enigma Rotary Machine.
##### Enigma Rotary
Enigma Rotary encryption machine is a generator that was used in World War II, the data was encrypted in a massive quantity. You can see in the image below that the disc is used multiple times. So we use this disc multiple times and change it with our texts. Hence one side is being coded and the other side is being informed about the steps. This was decoded by Marian Rejewski. The evolution of ciphering and deciphering has been taking place equally.