scholarly journals Quantum Cryptography: The Future of Internet and Security Management

2021 ◽  
Vol 1 (1) ◽  
pp. 1-12
Author(s):  
Faisal Abbasi ◽  

In today’s world, cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be “Inevitable to Track”. But living in an era where nothing is impossible to achieve, so cryptographic techniques are exposed to both technologies’ advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.

1997 ◽  
Vol 20 (1) ◽  
pp. 78-79
Author(s):  
Jon Oberlander

Clark & Thornton speculate that intervening in the real world might be a way of transforming type-2 problems into type-1, but they state that they are not aware of any definite cases. It is argued that the active construction of external representations often performs exactly this function, and that recoding via the real world is therefore common, if not ubiquitous.


Author(s):  
Rodney G. Peffer

I take up the "What is equality?" controversy begun by Amartya Sen in 1979 by critically considering utility (J. S. Mill), primary goods (John Rawls), property rights (John Roemer) and basic capabilities in terms of what is to be distributed according to principles and theories of social justice. I then consider the four most general principles designed to answer issues raised by the Equality of Welfare principle, Equality of Opportunity for Welfare principle, Equality of Resources principle and Equality of Opportunity for Resources principle. I consider each with respect to the more general normative principle that whatever theory of social or distributive justice we accept should be as ambition sensitive and endowment insensitive as feasible in real world circumstances. In this context I take up the problems of expensive tastes, expensive disabilities, lowered or manipulated preferences or ‘needs,’ and differential needs versus differential talents and abilities. I argue that the best solution is to adopt a modified version of Rawls’ theory which takes primary social goods as that which is to be distributed but which demands a Basic Rights principle that insures basic subsistent rights (as well as basic security rights) as the most fundamental principle of morality (and social justice), and then demands that Rawls’ Difference Principle be applied lexically to the ‘material’ goods of income, wealth, and leisure time, but done so that the social basis of self-respect is never undermined.


Author(s):  
Filiz Erdoğan Tuğran ◽  
Aytaç Hakan Tuğran

This chapter describes how technology, progressing rapidly, and especially computer technology has become an indispensable detail in daily life. The act of playing games starting to become virtual has emerged as a progress. In these early years, when the line between place and space has started to become thinner and people began to recognize the lines of flight between the real world and the virtual world, the movie “Tron” made an attempt to explain this possibility of transitivity. 28 years after the first movie, the sequel “Tron Legacy” emphasizes that this possibility still exists. The individual, in this sea of possibilities, comes and goes between place and space and becomes distant to their temporal context, digitalized and goes through deterritorialization. The narrative of the fictional world, the game world in this fictional world, the real world and the game field in the real world will be discussed in terms of transmedia, and some assumptions will be put forward through people and therefore, the deterritorialization of the media.


Author(s):  
Anand Sharma ◽  
Alekha Parimal Bhatt

IoT-based healthcare is especially susceptible as many IoT devices are developed without keeping in mind the security issue. In addition, such smart devices may be connected to global networks to access anytime, anywhere. There are some security challenges like mobility, computational limitation, scalability, communication media, dynamic topology, and above all the data confidentiality in storage or in transmission. There are some security protocols and methodology which is used in IoT-based healthcare systems like steganography, AES cryptosystems, and RSA cryptographic techniques. Therefore, it is necessary to use quantum cryptography system to make sure the security, privacy, and integrity of the patient's data received and transmitted from IoT-based healthcare systems. Quantum cryptography is a very fascinating domain in cyber security that utilizes quantum mechanics to extend a cryptosystem that is supposed to be the unbreakable secure system.


2021 ◽  
Author(s):  
Bharadwaja V. Srividya ◽  
Smitha Sasi

The application of internet has spiked up in the present-day scenario, as the exchange of information made between two parties happens in public environment. Hence privacy of information plays an important role in our day to day life. There have been incredible developments made in the field of cryptography resulting in modern cryptography at its zenith. Quantum computers are one among them creating fear into security agencies across the world. Solving the complex mathematical calculations is uncomplicated using quantum computers which results in breaking the keys of modern cryptography, which cannot be broken using classical computers. The concept of quantum physics, into the cryptographic world has resulted in the advancement of quantum cryptography. This technique utilizes the idea of key generation by photons, and communicates between peer entities by secured channel. Quantum cryptography adapts quantum mechanical principles like Heisenberg Uncertainty principle and photon polarization principle to provide secure communication between two parties. This article focuses on generation of a secret shared key, later converted into Quantum bits (Qbits) and transmitted to the receiver securely.


Author(s):  
Arun Verma

“Cybercrime” also consist of engaging in conduct that is outlawed because it threatens order, cyberspace differs from crime primarily in the way it threatens order. Cybercrime differs from crime primarily in the way it is committed: Criminals use guns, whereas cybercriminals use computer technology. Most of the cybercrime we see today simply represents the migration of real world crime into cyberspace. Cyberspace becomes the tool, criminals use to commit old crimes in new way .…


2019 ◽  
Vol 114 (1) ◽  
pp. 164-178 ◽  
Author(s):  
JONATHAN N. KATZ ◽  
GARY KING ◽  
ELIZABETH ROSENBLATT

We clarify the theoretical foundations of partisan fairness standards for district-based democratic electoral systems, including essential assumptions and definitions not previously recognized, formalized, or in some cases even discussed. We also offer extensive empirical evidence for assumptions with observable implications. We cover partisan symmetry, the most commonly accepted fairness standard, and other perspectives. Throughout, we follow a fundamental principle of statistical inference too often ignored in this literature—defining the quantity of interest separately so its measures can be proven wrong, evaluated, and improved. This enables us to prove which of the many newly proposed fairness measures are statistically appropriate and which are biased, limited, or not measures of the theoretical quantity they seek to estimate at all. Because real-world redistricting and gerrymandering involve complicated politics with numerous participants and conflicting goals, measures biased for partisan fairness sometimes still provide useful descriptions of other aspects of electoral systems.


2019 ◽  
pp. 67-69
Author(s):  
R. M. Rusin

At the end of the 20 and the beginning of the 21 century as a result of the changes that took place in art, there was a need for a theoretical re- thinking of artistic practices. This task was assumed by artists, art critics, art critics and other agents of the artistic world, trying to clarify the pos- sibility of a new vision of art, give it an objective assessment. Obviously, understanding the specifics of contemporary art is not so much in the assessment itself, but in clarifying the fundamentals of a different understanding of such concepts as "classical art", "contemporary art," "virtual art." If classical art received a thorough understanding of the history of art, art history and aesthetics for centuries, virtual art, as a specific form of contemporary art, needs to be thoroughly investigated. Contemporary art is experiencing significant transformations in the context of post-industrial culture. Increasingly important are computational methods for the production of virtual artefacts. The report notes that contemporary virtual art is a new space dynamically captured by the postmod- ernist practices of contemporary art. In modern practices of postmodernism in the field of virtual art with the rapid development of computer tech- nology sharply decreases the fate of human presence in the process of creativity. Machine modelling as a product of collective creativity allows you to create a new virtual image, regardless of its existence in the real world. In modern practices in the field of virtual art, the idea of artificial ("synthetic imagination") is used, which is a machine imagination with the use of artificial modelling of man's imagination. Artificial imagination with the help of interactive search allows you to synthesize images from the data- base and create a new virtual image, regardless of its existence in the real world. Thus, the rapid development of computer technology is increasingly reducing the fate of human presence in the field of virtual art. Postmodern experiments stimulate the erosion of the boundaries between traditional forms and genres of art. The perfection and availability of technical means of production, the development of computer technology practically led to the disappearance of original creativity as an act of indi- vidual creation.


Author(s):  
Stephan Neumann ◽  
Jurlind Budurushi ◽  
Melanie Volkamer

Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter, security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques: secrecy, fairness, integrity, and verifiability. Furthermore, the chapter discusses their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluates security and cryptographic techniques with respect to the costs that come along with their real-world application. The authors conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.


Sign in / Sign up

Export Citation Format

Share Document