Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2006, Information Security Management Handbook, Fifth Edition, Volume 3
† Potentially solves significant keydistribution and management problems † Offers ahighly secure cryptographysolution † Is not meant to replace, nor will it replace, existing cryptographyt echnologies † Is anew hybrid model that combines quantum cryptographyand traditional encryption to create amuch moresecure system † Although not really readyf or widespread commercial use, is developing very fast.
JMSS, A2Z Journals, 2021
In today's world, the cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be "Inevitable to Track". But living in an era where nothing is impossible to achieve, so cryptography techniques are exposed to both technologies' advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.
Cryptologia, 1999
The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping should it not occur.
Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. This results from a fundamental part of quantum mechanics: the process of measuring a quantum system in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using quantum superposition or quantum entanglement and transmitting information in quantum states, a communication system can be implemented which detects eavesdropping. If the level of eavesdropping is below a certain threshold a key can be produced which is guaranteed as secure, otherwise no secure key is possible and communication is aborted. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security.
2015
Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.
— This Quantum cryptography is one of the emerging topics in the field of computer industry. This paper focus on quantum cryptography and how this technology contributes value to a defense-in-depth strategy pertaining to completely secure key distribution. The scope of this paper covers the technical challenges to implement the concepts of quantum cryptography. We describe the quantum key distribution by which two users who share no secret information (without having any private or public keys known before hand) initially exchange a random quantum transmission consisting of very faint flashes of polarized light. We are focusing on practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the " qubits " sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account.
Indian Journal of Science and Technology, 2017
Background/Objectives: The preferment from conventional computing to quantum computing has created new challengesinthefieldofcryptography.Thecryptographicalgorithmswhichensuredintractabilityinconventionalcomputingsurfacesseriouschallengeinquantumcomputing.Methods/Statistical Analysis:Byapplyingthequantummechanics quantumcryptographycanbeusedtounrestrictedlyforreliabledatacommunications.Findings:Thecryptographycurrently in use, known as conventional cryptography, depends absolutely on the hardness of the mathematical concepts. Ellipticalcurvecryptographytodayknownasmoderncryptographyisusedextensivelyforsecuringfinancialtransactions. Advancesinquantumcomputing,caneasilybreakthissecuritybyreversecomputingkeysfasterthantheconventional computers.Application/Improvements:Thispaperisanattempttoreviewfundamentalsofquantumcryptographytoas to representitineasiestpossiblewayforanovicedemonstratingquantumonetimepad.
Journal of Cybersecurity and Information Management, 2021
In the field of cryptography, new tasks are generated when advancement has taken place from conventional computing to quantum computing. In the case of computer security, cryptography had always been a valuable and essential tool. When quantum mechanics principles are applied to cryptography, it gives rise to a new system that will secure communication and also assures that no spying can take place. The work below presents the review on quantum cryptography, which includes the concept of quantum cryptography and what can be its evaluation measures. Articles of quantum cryptography from various databases have been studied. In this SLR various research questions are identified and on the basis of the results of their answers have been formulated for this review along with that various performance measures are also discussed.
2015
Quantum cryptography is gaining importance among IT security practitioners day by day. Theory of quantum cryptography is quite sound and its practical implementations are also becoming mature day by day. With mature technology many applications can use quantum cryptography as back bone like secure key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet and many more. In this paper we are discussing possibilities of quantum cryptography applications.
Quantum cryptography, leveraging the principles of quantum mechanics, represents a groundbreaking advancement in secure communication. This article provides a comprehensive overview of quantum cryptography, its foundational principles, key technologies, and potential applications. We discuss the theoretical underpinnings, practical implementations, current challenges, and future directions, emphasizing its potential to redefine cybersecurity in the quantum era.
IGI GLOBAL USA`, 2021
Cryptography is used for the secure communication in which two parties are involved. The most popular cryptographic issue is the transmission of confidential messages. The privacy is maintained using the cryptographic protocol. The security of quantum cryptography relies more on physics including quantum mechanics and statistics rather than on solving mathematical problems. A well-known application of quantum cryptography is quantum key distribution (QKD) that is used to establish communication by generating cryptographic keys. Moreover, it is based on the Heisenberg uncertainty principle that ensures the security and prevents from eavesdropping. Basically, quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding have been discussed
Advances in Intelligent Systems and Computing, 2019
This paper represents the overview of Quantum Cryptography. Cryptography is the art of secrecy and it is the use of quantum mechanical properties to perform cryptographic tasks. It is a way of securing the channel using quantum mechanics properties. There are so many examples of quantum cryptography but the most important example is Quantum Key Distribution, which provides a solution to the breaking of various popular public key encryption and signature schemes (e.g. RSA and ElGamal). This helps to solve the security problems and also makes the communication channel is more secure. There are so many advantages of quantum cryptography, one thing is that the quantum computer gives the quadratic speed up on the general problems and second thing is that the quantum cryptography lies in the fact it allows the completion of various cryptographic tasks. That is proven to be impossible using classical communication.
Quantum cryptography is a knowledge that guarantees ultimate safety. Associated to present cryptography that might be overcome by the expansion of an ultra-high-speed computer, quantum cryptography safeguards secure message since it is founded on the important bodily laws. It is an emergent technology in which two parties may concurrently produce shared, secret cryptographic key substantial using the broadcast of quantum conditions of light. Quantum cryptography is a novel way for secret communications present the final security pledge of the holiness of a Law of Nature. The quantum cryptography conviction on two innermost rudiments of quantum technicalities-the Heisenberg Uncertainty attitude and the standard of photon partition[19]. This research paper distillates on the trust of quantum cryptography, and in what method this knowledge contribute to the system security. This paper tactics the real world demand procedure of this know-how and the future itinerary in which quantum cryptography hasten.
Dr.Anil Lamba, 2018
Rapid development of supercomputers and the prospect of quantum computers are posing increasingly serious threats to the security of communication. Using the principles of quantum cryptography, quantum communication offers provable security of communication and is a promising solution to counter such threats. Quantum cryptography that does not depend on the computer capacity of the adversary but is absolutely guaranteed by the laws of quantum physics, although it is in an initial stage, it is necessary to motivate the work for research purposes in the academic world, industry and society in general is taken as a solid alternative of security.
2017 2nd International Conference on Anti-Cyber Crimes (ICACC)
Internet has become a global means of communication, turned our reality upside down. It has transformed communications, to the level that it is now our chosen standard of communication. Although there are many ways to protect information from undesired access, Quantum cryptography can be used to unconditionally secure data communications by applying the laws of quantum physics which overcomes the drawbacks of traditional classical cryptography, which depends on mathematical methods to limit attacks such as eavesdroppers. Quantum cryptography is considered to be a future replica of classical cryptography. In this survey paper, we will discuss about various protocols of cryptography. Also discussing about their vulnerabilities
2013
Maths-based cryptography has prevailed for years in the world of information security. Although this approach has succeeded till now, but it still has its drawbacks such as loopholes and life expectancy problem. Researchers found that Quantum Cryptography, which is based on the laws of physics, might be a good alternative. Therefore, we were motivated to analyze a number of research papers in the field. This paper studies both approaches, their advantages, disadvantages, and their expected future.
Cryptography - Recent Advances and Future Developments, 2021
The application of internet has spiked up in the present-day scenario, as the exchange of information made between two parties happens in public environment. Hence privacy of information plays an important role in our day to day life. There have been incredible developments made in the field of cryptography resulting in modern cryptography at its zenith. Quantum computers are one among them creating fear into security agencies across the world. Solving the complex mathematical calculations is uncomplicated using quantum computers which results in breaking the keys of modern cryptography, which cannot be broken using classical computers. The concept of quantum physics, into the cryptographic world has resulted in the advancement of quantum cryptography. This technique utilizes the idea of key generation by photons, and communicates between peer entities by secured channel. Quantum cryptography adapts quantum mechanical principles like Heisenberg Uncertainty principle and photon polar...
2013
Abstract: We show concept of BB84 quantum key distribution (QKD) protocol and analyze its use as an information system. The difference between classical and quantum cryptography is presented in a way of understanding the main advantage of quantum information processing over classical information processing. At the end of the article, we present today and future use of quantum cryptography and possible impact on security of information systems.
2015
Quantum cryptography is a technology that ensures the security. Quantum cryptography ensures secure communication based on the fundamental physical laws. The quantum cryptography is based on the two elements of quantum mechanics -the Heisenberg Uncertainty principle and the principle of photon polarization. This paper focuses on the principle of quantum cryptography, mechanism how photons are encrypted and its contribution towards real-time security in all domains of application development. key words: Quantum cryptography, Quantum key distribution (QKD), Polarization, Heisenberg Uncertainty principle, Secure communication.
Journal of Quantum Computing, 2021
Quantum Key Distribution seems very promising as it offers unconditional security, that's why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.
International Journal of Advanced Networking and Applications
Present cryptography algorithms are based on mathematical problem such as factoring two large prime numbers and N vs NP problem. But computing power and evolution in mathematics increases day by day so it’s easy to reverse one way function to quickly such as that of factoring large integers. So the solution is to build a cryptosystem which secure our communication even the computing power is to high so we introduce quantum physics in cryptography which lead to evaluation of quantum cryptography. Quantum cryptography one of the emerging topics in field of computer industry. This paper is an attempt to review fundamentals of quantum cryptography and also analyses few application areas of quantum cryptography and it’s limitation.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.