*********
*********
Cyber Capstone
 
2.8.3 - Quantum Cryptography and Ephemeral Keys	  Week of April 1
 
3.2.3 - Database Security  Week of April 8
 
1.2.16 - Cryptographic Attacks	 
 
2.3.3 - Secure Coding Techniques	 
 
2.1.2 - Data Sovereignty and Protection	 

*********
*********
Due Date: April 2, 2024
Assignment
-Practice your Quizizz (General Cyber Capstone Terms)
-Exam will be next week.
-Click on this to access your quizizz.
https://quizizz.com/join?gc=79005261

 

*********
*********

Quantum cryptography is a branch of cryptography that uses the principles of quantum mechanics to secure communication and protect information from being intercepted or compromised. Unlike traditional cryptographic techniques, which rely on mathematical problems that are difficult for classical computers to solve, quantum cryptography uses the behavior of particles at the quantum level (like photons) to create a secure communication channel. The most well-known application of quantum cryptography is Quantum Key Distribution (QKD), which enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. The security of QKD is based on the fundamental principles of quantum mechanics, such as the Heisenberg Uncertainty Principle and quantum entanglement, ensuring that any attempt at eavesdropping can be detected.

Ephemeral keys play a critical role in modern cryptography, including quantum cryptography, by enhancing security through the use of temporary keys for encryption. An ephemeral key is a random encryption key generated for each interaction or session, used once and then discarded. This ensures that even if a key is compromised, it can only be used to decrypt data from that specific session, significantly reducing the potential impact of a security breach. Ephemeral keys are a cornerstone of secure communication protocols, such as TLS (Transport Layer Security), providing forward secrecy—a property ensuring that the compromise of long-term keys does not compromise past session keys, thus keeping past communications secure even if current keys are compromised.

Together, quantum cryptography and the use of ephemeral keys represent a robust approach to securing data and communications, especially in the face of evolving technological advances and the potential future threats posed by quantum computing to traditional encryption methods.

Due Date: April 3, 2024

2.8.3-Quantum Cryptography and Ephemeral Keys
Teacher Notes - Read this.
Class note - Read this .

Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "Lastname 2.8.3-Quantum Cryptography Guided Notes Answers"
Update Lastname to your last name.
Title: "2.8.3-Quantum Cryptography".
Modify the Standard heading with your information.

Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals

Guided Notes Answer this.

Copy the document found below into a google document.
Answer the questions in your google document.
Highlight the answer in yellow.
Name the the google document "Lastname - 2.8.3-Quantum Cryptography Quiz"
Update Lastname to your last name.
Title: "2.8.3-Quantum Cryptography".
Modify the Standard heading with your information.

Amanda Success (Period 9)
Monday December 25, 2023
Seat 99 (Grade level 13)
Cyber Fundamentals
Quiz Answer here.

*********
*********
*********

Resources you may need and select Web address you may need (Below)

*********
*********
*********
 
-Locate your Cyber Range Passwords below by seat number.
Cyber Range Sign on ids and passwords (Period 1)
Click here and get your id and password.

Click here for your cyber range.
https://apps.cyber.org/login

*********
*********

-Using Linux and the python interpreter

If you have forgotten how to boot up your Kali Linux machine and run python.
Click here for full instructions.