scholarly journals An Emphasis on Quantum Cryptography and Quantum Key Distribution

2021 ◽  
Author(s):  
Bharadwaja V. Srividya ◽  
Smitha Sasi

The application of internet has spiked up in the present-day scenario, as the exchange of information made between two parties happens in public environment. Hence privacy of information plays an important role in our day to day life. There have been incredible developments made in the field of cryptography resulting in modern cryptography at its zenith. Quantum computers are one among them creating fear into security agencies across the world. Solving the complex mathematical calculations is uncomplicated using quantum computers which results in breaking the keys of modern cryptography, which cannot be broken using classical computers. The concept of quantum physics, into the cryptographic world has resulted in the advancement of quantum cryptography. This technique utilizes the idea of key generation by photons, and communicates between peer entities by secured channel. Quantum cryptography adapts quantum mechanical principles like Heisenberg Uncertainty principle and photon polarization principle to provide secure communication between two parties. This article focuses on generation of a secret shared key, later converted into Quantum bits (Qbits) and transmitted to the receiver securely.

Author(s):  
S. Venkata Lakshmi ◽  
Sujatha Krishnamoorthy ◽  
Mudassir Khan ◽  
Neeraj Kumar ◽  
Varsha Sahni

Cryptography is used for the secure communication in which two parties are involved. The most popular cryptographic issue is the transmission of confidential messages. The privacy is maintained using the cryptographic protocol. The security of quantum cryptography relies more on physics including quantum mechanics and statistics rather than on solving mathematical problems. A well-known application of quantum cryptography is quantum key distribution (QKD) that is used to establish communication by generating cryptographic keys. Moreover, it is based on the Heisenberg uncertainty principle that ensures the security and prevents from eavesdropping. Basically, quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding have been discussed.


Author(s):  
Rishi Dutt Sharma

Quantum cryptography is an emerging technology in which two parties can secure network Communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven wiesner wrote “conjugate coding”. The quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg uncertainty principle and the principle of photon polarization. The Heisenberg uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper cannot copy unknownqubits i.e. unknown quantum states, due to no-cloning Theorem which was first presented by wootters andzurek in 1982.this research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of Quantum cryptography, and the real world application implementation of this technology and finally the future direction in which quantum cryptography is forwards


2018 ◽  
Author(s):  
Rajendra K. Bera

It now appears that quantum computers are poised to enter the world of computing and establish its dominance, especially, in the cloud. Turing machines (classical computers) tied to the laws of classical physics will not vanish from our lives but begin to play a subordinate role to quantum computers tied to the enigmatic laws of quantum physics that deal with such non-intuitive phenomena as superposition, entanglement, collapse of the wave function, and teleportation, all occurring in Hilbert space. The aim of this 3-part paper is to introduce the readers to a core set of quantum algorithms based on the postulates of quantum mechanics, and reveal the amazing power of quantum computing.


Author(s):  
Demetris Nicolaides

Everything is constantly changing, and nothing is ever the same, Heraclitus proposed, and in accordance with Logos, the intelligible eternal law of nature. Thus, everything is in a state of becoming (in the process of forming into something) instead of being (reaching or already being in an established final state beyond which no more change will take place). This means that things, permanent things, no longer exist—for they contradict his theory of constant change—only events and processes exist. His doctrine has found strong confirmation in modern physics, for, according to it, absolute restfulness and inactivity are impossibilities. Points in Einstein’s four-dimensional space-time continuum are events, and so are the quarks and leptons—for, unlike in deterministic Newtonian physics, matter in probabilistic quantum physics lost its permanence and identity because of the Heisenberg uncertainty principle. Moreover, all happenings, evidence suggests, are consistent with a single universal law.


2011 ◽  
Vol 55 (3) ◽  
pp. 349-353 ◽  
Author(s):  
Andrew Pickering

This article explores crossovers from Eastern philosophy and spirituality to contemporary science and medicine in the West. My interest is not so much in specific lines of historical transmission, as in the channels through which they flow. In particular, my argument is that different ontologies – visions of how the world is – either facilitate or block such exchanges. As an example, think about physics. The ontology of mainstream physics is a modern, dualist one, inasmuch as physical thought revolves around a material world from which anything human is absent, and the human leftovers fall to the humanities and social sciences. This ontology, more or less by definition, blocks any resonance with Eastern ideas or practices, and, accordingly, they are almost entirely absent from the history of physics, except, importantly, in lines of work on the foundations of physics, especially quantum mechanics. If one meditates on the Heisenberg uncertainty principle, for instance, boundaries between the observer and the observed start to unravel, the dualist ontology erodes, and there, indeed, one finds all sorts of resonances with the East, as elaborated in an endless list of books that includes, for example, The Tao of Physics and The Dancing Wu Li Masters. That is my basic idea: resonances with the East spring forth in Western science whenever modern dualism starts to fray around the edges. But this essay is not about physics, and I turn now to the post-war history of cybernetics in Britain and its rather different non-modern ontology.


2011 ◽  
Vol 3 (1) ◽  
pp. 7-20 ◽  
Author(s):  
Ewa Drabik

Classical and Quantum Physics in Selected Economic ModelsA growing number of economic phenomena are nowadays described with methods known in physics. The most frequently applied physical theories by economists are: (1) the universal gravitation law and (2) the first and second law of thermodynamics. Physical principles can also be applied to the theory of financial markets. Financial markets are composed of individual participants who may be seen to interact as particles in a physical system. This approach proposes a financial market model known as a minority game model in which securities and money are allocated on the basis of price fluctuations, and where selling is best option when the vast majority of investors tend to purchase goods or services, and vice versa. The players who end up being on the minority side win.The above applications of physical methods in economics are deeply rooted in classical physics. However, this paper aims to introduce the basic concepts of quantum mechanics to the process of economic phenomena modelling. Quantum mechanics is a theory describing the behaviour of microscopic objects and is grounded on the principle of wave-particle duality. It is assumed that quantum-scale objects at the same time exhibit both wave-like and particle-like properties. The key role in quantum mechanics is played by: (1) the Schrödinger equation describing the probability amplitude for the particle to be found in a given position and at a given time, and as (2) the Heisenberg uncertainty principle stating that certain pairs of physical properties cannot be economic applications of the Schrödinger equation as well as the Heisenberg uncertainty principle. We also try to describe the English auction by means the quantum mechanics methods.


It is assumed that certain mathematical or computational problems which are used in traditional cryptographic schemes are hard to solve for an attacker using today’s computers. But, lots of companies are trying to build quantum computer and in coming few years commercial quantum computer will be in reality. Security of traditional asymmetric cryptographic algorithms can be broken using quantum computers. So, researchers all over the world are planning for transition to post-quantum cryptography. One solution is to build hybrid solution combining both traditional and post-quantum primitives which will provide traditional cryptographic guarantees as well as quantum resistance [1].The best and feasible hybrid solution can be used in the protocols like SSL/TLS, SSH and PGP.


Author(s):  
V.E. Rodimin ◽  
L.I. Stefanenko ◽  
A.G. Sergeev ◽  
Yu.V. Kurochkin

Lack of understanding of the ideas of quantum physics leads to the fact that the very word "quantum" begins to be perceived as a synonym for something mysterious, incomprehensible, and even doubtful. The arising errors sometimes lead to inadequate media coverage of the development of quantum technologies, as the case with the ignorant reaction of the press in June 2016 to the statement of the Russian authorities about the prospects of quantum teleportation, which some media presented as teleportation from science fiction. Such misunderstandings can impede the formation of the necessary trust in quantum technologies on the part of the business community, politicians and the public. In part, the reason for this state of the art may be the insufficient attention of physicists themselves to the development of popular scientific and pedagogical discourse, which makes it possible to correctly introduce the ideas of quantum mechanics into the context of general culture. For decades, physicists have flaunted the kind of esotericism of quantum mechanics. Journalists love to quote the classics of quantum physics: “Those who are not shocked when they first come across quantum theory cannot possibly have understood it” (Niels Bohr); “I think I can safely say that nobody understands quantum mechanics” (Richard Feynman); “Quantum mechanics is absolutely meaningless” (Roger Penrose) [1]. Indeed, for many quantum-scale phenomena, no analogues have yet been found in the everyday world, and they are difficult to express in our everyday language. As a result, the introduction to quantum mechanics begins with a description of the mathematical formalism, which becomes an obstacle for the untrained listener and is not suitable for popularization. Moreover, such an approach creates problems for physicists themselves: many of them, studying the mathematical formalism of quantum mechanics and being convinced in practice of its effectiveness, do not ask the question of how the founders of this science were able to go in the opposite direction and, starting from experience, find the required formalism. As a result, important problematic and heuristic aspects of the development of science may drop off even professional physicists’ radar. In view of the above, an important task is to find effective explanatory techniques that allow one to talk about quantum phenomena without resorting to mathematical apparatus and without abuse of doubtful metaphors. This article attempts to find such an approach to explaining quantum cryptography. The choice in its favor is determined by the fact that it is one of the most mature quantum technologies of the second generation, which is already beginning to generate a demand for technical specialists to set up and maintain secure quantum communication lines. This activity requires a general understanding of the ideas of quantum mechanics underlying the technology, but at the same time, it does not require full knowledge of the mathematical apparatus that is used in research and development. In accordance with this, the task was set to outline the principle of quantum cryptography without resorting to such abstract concepts as the state space of a quantum system, its bases and the choice between them in quantum measurement. In a popular scientific sense, the advantage of quantum cryptography is a simplicity for understanding. Our experience shows that its main points can be explained to students in about half an hour without extraordinary mental effort. It is also enigmatical and fascinating, since, on the one hand, it is associated with spy codes, and on the other hand, it provides protection based on the laws of nature. Methodologically, the positive aspect of quantum cryptography is valuable. Many fundamental premises of quantum physics are negative: the impossibility of making any measurement without affecting the system, the Heisenberg uncertainty principle, the nocloning theorem. At the same time, quantum cryptography, on the contrary, allows an absolutely secure distribution of the encryption key.


Author(s):  
Nilay R. Mistry ◽  
Ankit Y. Dholakiya ◽  
Jay P. Prajapati

Quantum internet is an innovative approach to secure communication. Quantum internet is the next revolution in technology that enables the devices to perform operations that are beyond the classical internet. Quantum internet with quantum cryptography is one of the best solutions for secure data communication. Quantum internet uses the fundamental laws of quantum physics, which make it secure against sophisticated network attacks. In this research, the authors described quantum cryptography, which enhances the secure transmission over quantum internet using cryptographic protocols. These protocols use random bits transformations, which prevent attackers to make out the patterns of random bits transformations. Also, they introduced the conceptual OSI model for quantum internet, which makes it easy to understand the working of the quantum internet at different layers. Quantum internet can be implemented in intelligence network, satellite communication, critical infrastructure, etc. This can mark a significant change in secure communication.


2021 ◽  
Vol 158 (3-4) ◽  
pp. 7-38
Author(s):  
Tomasz Kuczerski ◽  
Michał Dyszyński

The paper includes basic information over the domain of quantum physics needed to understand basic principles of calculations and operations with the use of quantum computers. Questions of the unit of quantum information – qubit, and the Bloch’s zone are thoroughly explained. The paper is aimed to be an introduction into the world of quantum IT for persons beyond the quantum physics who want to use the quantum algorithms for their scientific researches.


Sign in / Sign up

Export Citation Format

Share Document