Preview

Quantum Cryptography

Better Essays
Open Document
Open Document
1404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quantum Cryptography
QUANTUM CRYPTOGRAPHY

Arka Deb, Nagaraja.H, Noor Afshan Fathima

III sem Computer Science and Engineering
P E S College of Engineering Mandya, India. mr.arkadeb@rediffmail.com afshan.shokath@gmail.com nagraj.hpk@gmail.com

Keywords— Cryptography, Quantum Cryptography, Photons, Polarization, Key.

I. Introduction Privacy is paramount when communicating sensitive information, and humans have invented some unusual ways to encode their conversations. Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. The goal of quantum cryptology is to thwart attempts by a third party to eavesdrop on the encrypted message.

II. QUANTUM CRYPTOGRAPHY Cryptology is the process of encoding (cryptography) and decoding (crypto analysis) information or messages (called plaintext). All of these processes combined are cryptology. Earlier cryptology was based on algorithms -- a mathematical process or procedure which were created by a sender and transmitted to a receiver. These algorithms are used in conjunction with a key, a collection of bits (usually numbers). Without the proper key, it 's virtually impossible to decipher an encoded message, even if you know what algorithm to use. In modern cryptology, the third party (adversaries) can passively intercept sender and receiver’s encrypted message -- he can get his hands on the encrypted message and work to decode it without the sender and receiver knowing he has their message. The adversary can accomplish this in different ways, such as wiretapping sender or receiver’s phone or reading secure e-mails. Quantum cryptology is the first cryptology that safeguards against passive interception as photons come into play. Since we can 't measure a photon without affecting its behaviour, Heisenberg 's Uncertainty Principle emerges when the third



References: 1] Security of continuous variable quantum key distribution- A. Leverrier, E. Karpov, P. Grangier and N.J. Cerf J. 2] Optical Networking for Quantum key Distribution and Quantum Communication.- T.E Chapuran, N.A. Peter, Jackle and M.S. Goodman. 3] Engineering Physics-P Basavaraju 4] Wikipedia 5] www.howstuffworks.com

You May Also Find These Documents Helpful

  • Powerful Essays

    Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    In the following essay I will examine our Constitutional right to privacy. Though the right to privacy is not mentioned in the Constitution, we have good reason for thinking that it is a fundamental human right. To defend my position, I will examine the term “privacy” in a philosophical and legal context, secondly I will explain why Supreme Court rulings over the years have established that privacy is a basic human right, and finally I will explain reasonable limits on this right.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This article proposes designing and measuring a single flux quantum circuits for switching data at 2.5Gbps. This is by use of a switching node that is helpful in the formation of a larger switching fabric. This is helpful in routing data quickly based on the bits that are present in the data streams. This solution in the NHS scenario since it can help route the imaging files data in an active input line when the other is idle.…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Comm 1310 Exam 1

    • 4222 Words
    • 17 Pages

    Receiver- The person who decodes a message and attempts to make sense of what the source has encoded…

    • 4222 Words
    • 17 Pages
    Satisfactory Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    We have a fundamental need for privacy because all of us have things that we want to hide from others. For example, we may be involved in a crime intentionally sometimes. When we download songs online and share them to others, we are violating the Digital Millennium Copyright Act. This will surely cause a lot of troubles for us. Fortunately, with the aid of privacy, we can hide our transgressions and get rid of the trouble. Not only can privacy help us hide something bad, but it can also help us hide something secret. In the article “Why Privacy Matters Even If You Have Nothing To Hide,” Daniel J. Solove shares an example that all of us will not want to show others our naked photos (342). This is a strong example to show we need privacy for hiding things other than bad things from others. It is impossible for a human being to have nothing to hide and our lives are surely being bothered by government’s…

    • 1062 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Chapter 3 Review

    • 1240 Words
    • 4 Pages

    Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from unsanctioned intrusion”.…

    • 1240 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    UNIT 501

    • 3497 Words
    • 10 Pages

    In 1948, Shannon was an American mathematician, Electronic engineer and Weaver was an American scientist both of them join together to write an article in “Bell System Technical Journal” called “A Mathematical Theory of Communication” and also called as “Shannon-Weaver model of communication”.…

    • 3497 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    A powerful tool to work with our unconscious/subconscious selves and a phenomenal way to get exactly what we want in life, is to map out and create our quantum universes.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The communication process begins with the sender (or transmitter) formulating a message they wish to transmit. The sender ‘encodes’ the message ie decides what they are going to say and how they will say it. The message is next transmitted via the most appropriate means to be successfully received. Once…

    • 2645 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    In an information security context, privacy is not absolute freedom from observation, but rather it is a more precise state of being free from unsanctioned intrusion.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There is an old real-estate joke about the three most important factors in the business of realty, the punch line being “Location Location Location”. Though made in jest this idea is not far from the truth since the area in which any business type organization is established will typically play a big part in its overall success. On a much bigger scale the success of any business is also greatly dependant on the state of the global environment as well. Trends in culture and practices from other organizations will all ultimately have a huge impact on the way a business functions. It is the focus of this paper to explore the relationship between any business type organizations and the environments that influence its success both short term and long term.…

    • 2792 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Have you ever watched an episode of Star Trek and wondered if the possibility of teleportation existed in real life? Well, the good news is that it’s real! In 2008 for the first time ever in history, a team of scientists from the Joint Quantum Institute (JQI) at the University of Maryland was able to successfully teleport information directly from one atom to another over the distance of a meter. While this accomplishment isn’t as impressive as teleporting an actual human being, it’s still a significant scientific breakthrough that could lead to many possible future innovations.…

    • 1138 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Second fundamental problem for less communication is that we might take more efforts to complete a task or solve a problem, moreover fail and lost in the assignment. For instance, the famous scientist—Albert Einstein, who found the special relativity and led a new century of quantum mechanics, had benefited from communication. During the time that he was miserable about how the atom moves and the accurate measurement of both situation and momentum of an atom, a meeting among all these forward physical scientists stimulates his genius. Exchanging of others’ attitudes arise up his suspicious of Newton’s classical mechanics. Then he transformed his point to a new hypothesis—which is now called quantum mechanics. We may not ignore the efforts he spent on this theory, however, it is our duty to take a glance of the communication during that seminar.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays