Quantum Cryptography : A Comprehensive Study
Keywords:
Classical Cryptography, Quantum Cryptography, Encryption, DecryptionAbstract
Quantum Cryptography is an applied branch of optical physics to establish a cryptosystem which is future ready. Secrecy is need of today's digitally growing world. Classical cryptography depends on mathematical functions and computational security of those functions. Modern cryptography can be defeated by increasing computing power day by day and hence no more future secure. Due to said reason quantum cryptography is gaining much importance among IT security practitioners. Word "Quantum" means the smallest particle of matter and energy which inhibits some special behavior. This paper discusses basic underlying principles of Quantum Cryptography like Heisenberg's uncertainty principle and different characteristics of photon polarization. Quantum cryptography is combination of dominant physics with mathematics as a key aspect to generate security model.
References
- Vittorio, S., 2002, "Quantum Cryptography: Privacy Through Uncertainty" http://www.csa.com/discoveryguides/crypt/overview.php
- Id Quantique White Paper, 2005, "Understanding Quantum Cryptography" http://www.idquantique.com/products/files/vectis-understanding.pdf
- Ford, J., 1996, "Quantum Cryptography Tutorial" http://www.cs.dartmouth.edu/~jford/crypto.html#1
- Bennett, C.H., Brassard, G., 1984, "Quantum Cryptography: Public Key Distribution and Coin Tossing"
- Bennett, C.H., 1992,"Quantum Cryptography: Uncertainty in the Service of Privacy"
- Papanikolaou, N., 2004, "Techniques For Design And Validation Of Quantum Protocols"
- Goldwater, S., 1996, "Quantum Cryptography and Privacy Amplification" http://www.ai.sri.com/~goldwate/quantum.html
- Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , "Quantum cryptography"
- Fuchs, C. A., Gisin, N., Gr?ffiths, R. B., Niu, C. S., Peres, A. , 1997, "Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy"
- Petra Pajic, 2013, "Quantum Cryptography"
- D.J. Bernstein, 2009 Post-Quantum Cryptography, Springer,
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET
This work is licensed under a Creative Commons Attribution 4.0 International License.