Classical Cryptography and Quantum Cryptography
Cryptography is the technique which is used for doing secure communication between two parties in the public environment where unauthorized users and malicious attackers are present. In cryptography there are two processes i.e. encryption and decryption performed at sender and receiver end respectively. Encryption is the processes where a simple multimedia data is combined with some additional data (known as key) and converted into unreadable encoded format known as Cipher. Decryption is the reverse method as that of encryption where the same or different additional data (key) is used to decode the cipher and it is converted in to the real multimedia data. Cryptography techniques can be categorized according to their basic principles or protocols they follow. But here we are going to concentrate on the two types of cryptography technique: Classical Cryptography and Quantum Cryptography. These are explained as following below. 1. Classical Cryptography: Classical cryptography is based on the mathematics and it relies on the computational difficulty of factorizing large number. The security of classical cryptography is based on the high complexity of the mathematical problem for the instance factorization of large number. In the classical cryptography the original data i.e., the plain text is transformed into the encoded format i.e. cipher text so that we can transmit this data through insecure communication channels. A data string which known as key is used to control the transformation of the data from plain text to cipher text. This arrangement helps to keep data safe as it required the key for extracting the original information from the cipher text. Without the key no one can read the data. In this technique it is assumed that the only authorized receiver has the key. Classical Cryptography has two types of techniques:
- Symmetric Cryptography: In the symmetric cryptography a single key is used for encrypting and decryption the data. This encryption key is private key. This is the limitation of this encryption technique that this private key must be distributed only among the authorized sender and receiver.
- Asymmetric Cryptography: In the asymmetric cryptography a pair of key, i.e., public key and private key is used for encryption and decryption. A sender can use its public key to encrypt the data and on receiver end receiver can decrypt the data by using its private key. This technique overcomes the problem of key distribution. Advantages of Classical Cryptography:
- While employing the one-time pad, it is unbreakable.
- It is easy to do manually, no computer required.
- It protects the plain text from casual snooping.
- While employing the one-time pad, it is cumbersome and requires a personal meetup to exchange the pads.
- If not employing the OTP, anyone who is even remotely interested in knowing what you wrote and knows about cryptography will be able to break the encryption.
2. Quantum Cryptography: Quantum Cryptography is based on physics and it relies on the laws of quantum mechanics. It is arising technology which emphasizes the phenomena of quantum physics in which two parties can have secure communication based on the invariabilities of the laws of the quantum mechanics. Quantum mechanics is the mathematical framework or set of rules for the construction of physical theories. There are 2 important elements of quantum mechanics on which quantum cryptography depends: Heisenberg Uncertainty Principle and Photon Polarization Principle. These are explained as following below.
- Heisenberg Uncertainty Principle: This principle says that if you measure one thing, you cannot measure another thing accurately. For example, if you apply this principle to human, you could measure a person’s height, but you can’t measure his weight. The only odd thing about this principle is that it becomes true only for the instant at which you try to measure something. This principle is applied to the photons. Photons have wave like structure and are polarized or tilted in certain direction. While measuring photon polarization, all subsequent measurements are get affected by the choice of measures that we made for polarization. This principle plays the vital role to prevent the efforts of attacker in quantum cryptography.
- Photon Polarization Principle: This principle refers that, an eavesdropper cannot copy the unique quantum bits, i.e., unknown quantum state, due to the no-cloning principle. If an attempt is made for measuring any properties, it will disturb the other information.
Advantages of Quantum Cryptography:
- It establishes secure communication by providing security based on fundamental laws of physics instead of mathematical algorithms or computing technologies used today.
- It is virtually unhackable.
- It is simple to use.
- Less resources are needed in order to maintain it.
- It is used to detect eavesdropping in QKD (Quantum Key Distribution). This is due to the fact that it is not possible to copy the data encoded in quantum state.
- The performance of such cryptography systems is continuously improved.
- It offers perfect secrecy, meaning that the information cannot be intercepted or tampered with without detection.
- It can detect if any attempt has been made to intercept or eavesdrop on the communication, which can help prevent attacks before they occur.
- It has the potential to support large-scale, secure communication networks that are resistant to attacks by quantum computers, which could be used to break many current cryptographic systems.
Disadvantages of Quantum Cryptography:
- The world wide implementation of this can take up lots of jobs and hence unemployment will increase.
- While traveling through the channel polarization of photon may change due to various causes.
- Quantum cryptography lacks many vital features such as digital signature, certified mail etc.
- The largest distance supported by QKD is about 250 KM at a speed of 16 bps through guided medium.
- Quantum cryptography requires specialized equipment, including lasers and photon detectors, which can be expensive and difficult to maintain.
- It is sensitive to environmental factors, such as temperature and electromagnetic interference, which can affect the accuracy and reliability of the communication.
- It is currently limited by the distance over which secure communication can be established, which is typically less than a few hundred kilometers.