Quantum Cryptography Key Distribution

Author(s):  
Bhanu Chander

Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.

Author(s):  
Bhanu Chander

Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.


Author(s):  
Meenakshi Sharma ◽  
Sonia Thind

In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.


2010 ◽  
Vol 20 (03) ◽  
pp. 239-250 ◽  
Author(s):  
NAYA NAGY ◽  
MARIUS NAGY ◽  
SELIM G. AKL

It has been said that quantum cryptography in general offers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quantum key enhancement. This paper shows that quantum cryptography can do significantly more. The quantum protocol described here distributes an unbreakable secret key to the two parties by relying on public information only. This is the first time that quantum cryptography is shown to be able to produce secret information using only public information. This contribution is also unique for cryptography in general, classical and quantum.


2019 ◽  
Vol XXII (1) ◽  
pp. 171-176
Author(s):  
Zisu L.

Quantum cryptography, the principles of which are based on classical mechanics laws, solves exceptionally the issue of key distribution in classical cryptography. BB84, the first quantum key distribution created by Charles Bennett and Gilles Brassard in 1984 offers unconditional security and allows the transmission of a key with the length equal to the length of the message. According to Vernom, using the key with the above feature once together with an encryption algorithm leads to the formation of a most secure cryptographic system. The paper presents a method for improving the BB84 quantum protocol, using ten states of polarization, quantum memory and direct communication in both directions. The implementation of both the proposed method and the BB84 protocol was done through a C# application.


Author(s):  
V.E. Rodimin ◽  
L.I. Stefanenko ◽  
A.G. Sergeev ◽  
Yu.V. Kurochkin

Lack of understanding of the ideas of quantum physics leads to the fact that the very word "quantum" begins to be perceived as a synonym for something mysterious, incomprehensible, and even doubtful. The arising errors sometimes lead to inadequate media coverage of the development of quantum technologies, as the case with the ignorant reaction of the press in June 2016 to the statement of the Russian authorities about the prospects of quantum teleportation, which some media presented as teleportation from science fiction. Such misunderstandings can impede the formation of the necessary trust in quantum technologies on the part of the business community, politicians and the public. In part, the reason for this state of the art may be the insufficient attention of physicists themselves to the development of popular scientific and pedagogical discourse, which makes it possible to correctly introduce the ideas of quantum mechanics into the context of general culture. For decades, physicists have flaunted the kind of esotericism of quantum mechanics. Journalists love to quote the classics of quantum physics: “Those who are not shocked when they first come across quantum theory cannot possibly have understood it” (Niels Bohr); “I think I can safely say that nobody understands quantum mechanics” (Richard Feynman); “Quantum mechanics is absolutely meaningless” (Roger Penrose) [1]. Indeed, for many quantum-scale phenomena, no analogues have yet been found in the everyday world, and they are difficult to express in our everyday language. As a result, the introduction to quantum mechanics begins with a description of the mathematical formalism, which becomes an obstacle for the untrained listener and is not suitable for popularization. Moreover, such an approach creates problems for physicists themselves: many of them, studying the mathematical formalism of quantum mechanics and being convinced in practice of its effectiveness, do not ask the question of how the founders of this science were able to go in the opposite direction and, starting from experience, find the required formalism. As a result, important problematic and heuristic aspects of the development of science may drop off even professional physicists’ radar. In view of the above, an important task is to find effective explanatory techniques that allow one to talk about quantum phenomena without resorting to mathematical apparatus and without abuse of doubtful metaphors. This article attempts to find such an approach to explaining quantum cryptography. The choice in its favor is determined by the fact that it is one of the most mature quantum technologies of the second generation, which is already beginning to generate a demand for technical specialists to set up and maintain secure quantum communication lines. This activity requires a general understanding of the ideas of quantum mechanics underlying the technology, but at the same time, it does not require full knowledge of the mathematical apparatus that is used in research and development. In accordance with this, the task was set to outline the principle of quantum cryptography without resorting to such abstract concepts as the state space of a quantum system, its bases and the choice between them in quantum measurement. In a popular scientific sense, the advantage of quantum cryptography is a simplicity for understanding. Our experience shows that its main points can be explained to students in about half an hour without extraordinary mental effort. It is also enigmatical and fascinating, since, on the one hand, it is associated with spy codes, and on the other hand, it provides protection based on the laws of nature. Methodologically, the positive aspect of quantum cryptography is valuable. Many fundamental premises of quantum physics are negative: the impossibility of making any measurement without affecting the system, the Heisenberg uncertainty principle, the nocloning theorem. At the same time, quantum cryptography, on the contrary, allows an absolutely secure distribution of the encryption key.


Author(s):  
Sagarmoy Ganguly ◽  
Asoke Nath

Quantum cryptography is a comparatively new and special type of cryptography which uses Quantum mechanics to provide unreal protection of data/information and unconditionally secure communications. This is achieved with Quantum Key Distribution (QKD) protocols which is a representation of an essential practical application of Quantum Computation. In this paper the authors will venture the concept of QKD by reviewinghow QKD works, the authors shall take a look at few protocols of QKD, followed by a practical example of Quantum Cryptography using QKD and certain limitations from the perspective of Computer Science in specific and Quantum Physics in general.


2020 ◽  
Vol 35 (36) ◽  
pp. 2050295
Author(s):  
Partha Sarathi Goswami ◽  
Tamal Chakraborty ◽  
Abir Chattopadhyay

Quantum cryptography has of late opened up the possibilities of exploiting the characteristics of quantum mechanics in the realm of network security. An interesting problem in cryptography is the distribution of the encryption key between the two parties involved in communication. This paper proposes a secure quantum key distribution protocol using the properties of super increasing knapsack sequences. The mapping from the knapsack sequences to the quantum states is achieved by rotating a three-bit quantum tuple.


Author(s):  
Meenakshi Sharma ◽  
Sonia Thind

In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.


Author(s):  
Bhavesh B. Prajapati ◽  
Nirbhay Kumar Chaubey

Quantum key distribution is an application of quantum cryptography which is based on quantum mechanics and optical physics. The word “quantum” means the smallest particle of matter and energy which inhibits unique special properties to make it different from normal matter. This chapter discusses underlying principles, and operations of quantum mechanics which are used to derive quantum key distribution protocols. This chapter also discusses elementary QKD protocols based on no cloning theorem and EPR correlations. Limitation of quantum key distribution is also discussed with reference to its implementation. Conceptual notes on quantum internet are also given.


Author(s):  
Rishi Dutt Sharma

Quantum cryptography is an emerging technology in which two parties can secure network Communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven wiesner wrote “conjugate coding”. The quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg uncertainty principle and the principle of photon polarization. The Heisenberg uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper cannot copy unknownqubits i.e. unknown quantum states, due to no-cloning Theorem which was first presented by wootters andzurek in 1982.this research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of Quantum cryptography, and the real world application implementation of this technology and finally the future direction in which quantum cryptography is forwards


Sign in / Sign up

Export Citation Format

Share Document