A Comprehensive Survey on: Quantum Cryptography
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Pranav Verma; Ritika Lohiya;
Page : 2214-2220
Keywords : Cryptography; Communication; Key Distribution; Quantum Cryptography; Security attacks;
Abstract
Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.
Other Latest Articles
- Performance Prediction of Players in Sports League Matches
- Software Defined Networking: Advanced Software Engineering to Computer Networks
- Survey on Security Threats and Security Algorithms in Cloud Computing
- A Prospective Comparison of the Ondansetron Plus Aprepitant, Versus Ondansetron for the Prevention of Chemotherapy Induced Nausea and Vomiting
- Experimental Analysis on Effect of Design Parameters on the Performance of Single Loop Pulsating Heat Pipe
Last modified: 2021-06-30 21:44:39