Limit of Privacy and Quantum Cryptography

Authors

  • Bhavesh B. Prajapati  Assistant Professor, IT Department, L. D. College of Engineering, Ahmedabad, Gujarat, India

Keywords:

Quantum Cryptography, Integrated Circuit, Quantum Theory, Quantum Algorithm, PKI, RSA, QKD

Abstract

Recent developments in quantum cryptography have started affecting security and privacy of modern classical cryptography. Just in 1994, Peter Shor represented algorithm for factoring large prime numbers which forced cryptographers and security experts to give attention to quantum cryptography. Modern classical Public Key Infrastructures depends on difficulty of factoring large prime numbers using RSA. Shor’s algorithm challenges this and makes jeopardy of modern PKI. For example, when we try to break 2048 bit RSA key using classical computers it will take billion years to break. But same can be broken within few seconds with mature quantum computing architecture. Having said this, quantum computers have their own limitations. They are having small memories, limited processing power and works on comparatively smaller distances. In this paper we discusses quantum cryptography and limitation of classical and quantum cryptography in providing privacy.

References

  1. "Practical Challenges in quantum key distribution" by EleniDiamanti, Hoi-Kwong Lo, Nature Publications,2016
  2. "Quantum cryptography and quantum key distribution Protocol: A Survey" by V. Padmavati, B. Visnuvardan, A.V.N. Krishna, IEEE 6th International Conference, 2016
  3. "Post quantum cryptography what advancements in quantum computing mean for IT professionals" by Logan O. Mailoux, IEEE 2016
  4. "QKDP’s Comparison Based upon Quantum Cryptography Rules" by AbdulbastAbushgra, KhaledElleithy, IEEE, 2015
  5. "Quantum cryptography and its applications over the internet" by Chi-Yuan Chen, Guo-jyunZeng, IEEE 2015
  6. "A Tutorial on Quantum Key Distribution" by Baokang Zhao, Bo Liu, Ilsun You, IEEE 10th International Conference, 2015
  7. "Quantum Cryptography: Pitfalls and Assets" by Deepshikha Sharma, IJERSTE, 2014
  8. "How secure is quantum cryptography" by Renato Renner, Optical Society of America, 2013
  9. "Key Distribution Protocol on Quantum Cryptography" by KondwaniMakanda, Jun-cheolJeon, IEEE, 2013
  10. "Quantum cryptography and comparision of quantum key distribution protocols" by ErgumGumus, G.Zeynep, Journal of Electrical and Electronics engineering,2008.
  11. "The formal study of quantum cryptography protocols" by Fan Yang, Yu-Jie, IEEE 2013
  12. Bennett, C. H. & Brassard, G. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (ed. Goldwasser, S.) 175–179 (IEEE Press, 1984).
  13. Scarani, A.Acin, Ribordy, G.Gisin.N."Quantum Cryptography protocols robust against Photon number Splitting attack." Physical Review Letters, vol.92.2004 http://www.qci.jst.go.jp/eqsi03/program/papers/O26-Scarani.pdf
  14. Secure communication with a publicly known key.C. K. A. Beige, B.-G. Englert and H. Weinfurter. ActaPhysicaPolonica A, 101(3):357–368,2002.
  15. Quantum cryptography: Public key distribution and coin tossing. C. H. Bennett and G. Brassard. Theoretical Computer Science, 560, Part1(0):7 – 11, 2014. Theoretical Aspects of Quantum Cryptography,celebrating 30 years of fBB84g.
  16. Quantum digital signatures without quantum memory. V. Dunjko, P. Wallden, and E. Andersson. Phys. Rev. Lett., 112:040502, Jan 2014.
  17. Quantum cryptography based on bell’s theorem.A. Ekert. Phys. Rev.Lett., 67:661–663, Aug 1991.
  18. Differential phase-shift quantum key distribution systems. K. Inoue. Selected Topics in Quantum Electronics, IEEE Journal of, 21(3):1–7,May 2015.
  19. Efficient quantum key distribution scheme and a proof of its unconditional security.H.-K. Lo, H. F. Chau, and M. Ardehali. J. Cryptol.,18(2):133–165, Apr. 2005.
  20. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations V. Scarani, A. Acin, G. Ribordy, and N. Gisin..Phys. Rev. Lett., 92:057901, Feb 2004.
  21. "Quantum Key Distribution Protocols: A Review," S. Reddy, Journal of Computational Information Systems, vol. 8, pp. 2839-2849, 2012.
  22. M. Khan, M. Murphy, and A. Beige, New Journal of Physics,vol. 11, p. 063043, 2009.
  23. "High error-rate quantum key distribution for long-distance communication," M. Elboukhari, M. Azizi, and A. Azizi, "Quantum key distribution protocols: A survey," International Journal of Universal ComputerSciences, vol. 1, pp. 59-67, 2010.
  24. "Towards practical and fast quantum cryptography," N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner, and V. Scarani, arXiv preprint quant-ph/0411022, 2004.
  25. "Quantum Cryptography: A comprehensive study", Bhavesh Prajapati, 2014, IJSRSET
  26. "A Brief Study of Quantum Cryptography Applications", Bhavesh Prajapati, 2015, International journal of scientific research in science and technology.
  27. " Quantum Key Distribution : A Comprehensive Study", Bhavesh Prajapati, 2016, International Journal of Scientific Research in Science and Technology (IJSRST)
  28. "Quantum Key Distribution Protocols : A Review". Bhavesh Prajapati, 2017, IJSRSET 

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Bhavesh B. Prajapati, " Limit of Privacy and Quantum Cryptography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.1567-1571, March-April-2018.