ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal OF Engineering Sciences & Management Research (Vol.4, No. 2)

Publication Date:

Authors : ;

Page : 1-6

Keywords : Quantum Cryptography; Network Security; Quantum Key Distribution; Key Sharing;

Source : Downloadexternal Find it from : Google Scholarexternal


Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. Cryptography is used to ensure that the contents of a message are confidentiality transmitted and would not be altered. The encryption and decryption process is carried out with help of keys. Key sharing plays a very important role in the cryptography. In this research paper we explain the principle of quantum cryptography and quantum key distribution protocols

Last modified: 2017-02-09 21:28:16