Quantum Cryptography: A New Generation of Information Technology Security System

被引:16
|
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
关键词
network security; quantum cryptography; quantum key distribution; photon polarization; quantum network;
D O I
10.1109/ITNG.2009.173
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote" Conjugate Coding", which took more than ten years to end this paper[19]. The quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system [4,12,14]. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits Le. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982[20]. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state Of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
引用
收藏
页码:1644 / 1648
页数:5
相关论文
共 50 条
  • [21] Provable Security in Quantum Cryptography
    Renner, Renato
    IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130
  • [22] The measure of security in quantum cryptography
    Niemiec, Marcin
    Pach, Andrzej R.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 967 - 972
  • [23] Unconditional security in quantum cryptography
    Mayers, D
    JOURNAL OF THE ACM, 2001, 48 (03) : 351 - 406
  • [25] CRYPTOGRAPHY ARCHITECTURE FOR INFORMATION SECURITY
    LENNON, RE
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 138 - 150
  • [26] Quantum cryptography and security analysis
    Babber, Karuna
    Singh, J. P.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2205 - 2216
  • [27] Cryptography with information theoretic security
    Imai, H
    Hanaoka, G
    Shikata, J
    Otsuka, A
    Nascimento, AC
    PROCEEDINGS OF 2002 IEEE INFORMATION THEORY WORKSHOP, 2002, : 73 - 73
  • [28] The security implications of quantum cryptography and quantum computing
    Cavaliere F.
    Mattsson J.
    Smeets B.
    1600, Elsevier Ltd (2020): : 9 - 15
  • [29] Quantum Cryptography - the Next Generation of Light-based Cryptographic Technology
    Yoichiro, Ito
    Hiroyuki, Toyama
    NEC Technical Journal, 2021, 16 (01): : 121 - 125
  • [30] Research on the Application of Quantum Cryptography in Improving the Information Security of Distribution Automation System in Low Voltage Station Area
    Tian, Erwei
    Zhang, Jianbin
    Zhao, Tianjian
    INTERNATIONAL JOURNAL OF MULTIPHYSICS, 2024, 18 (02) : 625 - 634