Quantum cryptography research paper

One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. Information Technology: Quantum Cryptography In traditional fibre optic communications, light pulses are used to transmit data across transmission channels. Further improvements were built on this foundation and included Time Polarization Ali, which uses the time between successive photons as the encryption, SARG04 and Decoy State; which both relied on the sharing of a photonic key before standardized data transmission Fehr, and Lo et al. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. This has a major drawback; the amount of data This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. Resources and Help Quantum cryptography: An emerging technology in network security Abstract: The uses of computer communications networks technologies have increased the incidents of computer abuse. To protect the data, it is algorithmically encrypted in each light pulse. The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real - world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.

One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. Bennett and Brassard set the foundation and proposed the BB84 protocol, which uses polarization of photons as it method of encryption.

Resources and Help Quantum cryptography: An emerging technology in network security Abstract: The uses of computer communications networks technologies have increased the incidents of computer abuse.

This has a major drawback; the amount of data Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network.

research paper on cryptography pdf

Because of these incidents, most organizations facing pressure to protect their assets. Further improvements were built on this foundation and included Time Polarization Ali, which uses the time between successive photons as the encryption, SARG04 and Decoy State; which both relied on the sharing of a photonic key before standardized data transmission Fehr, and Lo et al.

This means the data packet can transmit data only; thereby increasing data throughput per unit.

Bennett and Brassard set the foundation and proposed the BB84 protocol, which uses polarization of photons as it method of encryption. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. Further improvements were built on this foundation and included Time Polarization Ali, which uses the time between successive photons as the encryption, SARG04 and Decoy State; which both relied on the sharing of a photonic key before standardized data transmission Fehr, and Lo et al. Information Technology: Quantum Cryptography In traditional fibre optic communications, light pulses are used to transmit data across transmission channels. It will seek to explore its utility and application to industry today by investigating its strengths and limitations, the legal, social and ethical implications of its use and finally, any recommendations for improvements. This paper will seek to investigate the BB84 protocol to determine if it is a viable alternative to traditional AC. Because of these incidents, most organizations facing pressure to protect their assets. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. The underlying principle behind Quantum Cryptography QC is that we can increase the encryption strength of data traversing an optical channel by polarizing photons prior to transmission. This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. To protect the data, it is algorithmically encrypted in each light pulse.

The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real - world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.

For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks.

The principle of using the physical characteristics of light as an encryption methodology has been explored by numerous researchers. It will seek to explore its utility and application to industry today by investigating its strengths and limitations, the legal, social and ethical implications of its use and finally, any recommendations for improvements. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. This has a major drawback; the amount of data This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. This has a major drawback; the amount of data throughput is reduced as the space inside each pulse has to carry both data and encryption. Information Technology: Quantum Cryptography In traditional fibre optic communications, light pulses are used to transmit data across transmission channels. The underlying principle behind Quantum Cryptography QC is that we can increase the encryption strength of data traversing an optical channel by polarizing photons prior to transmission. Bennett and Brassard set the foundation and proposed the BB84 protocol, which uses polarization of photons as it method of encryption. Further improvements were built on this foundation and included Time Polarization Ali, which uses the time between successive photons as the encryption, SARG04 and Decoy State; which both relied on the sharing of a photonic key before standardized data transmission Fehr, and Lo et al. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. This means the data packet can transmit data only; thereby increasing data throughput per unit. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24].

This paper will seek to investigate the BB84 protocol to determine if it is a viable alternative to traditional AC.

This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. This has a major drawback; the amount of data throughput is reduced as the space inside each pulse has to carry both data and encryption.

The principle of using the physical characteristics of light as an encryption methodology has been explored by numerous researchers.

ieee papers on cryptography 2018
Rated 6/10 based on 9 review
Download
free research paper