ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Comprehensive Survey on: Quantum Cryptography

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)

Publication Date:

Authors : ; ;

Page : 2214-2220

Keywords : Cryptography; Communication; Key Distribution; Quantum Cryptography; Security attacks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.

Last modified: 2021-06-30 21:44:39