Quantum Cryptography: A New Generation of Information Technology Security System

被引:16
|
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
关键词
network security; quantum cryptography; quantum key distribution; photon polarization; quantum network;
D O I
10.1109/ITNG.2009.173
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote" Conjugate Coding", which took more than ten years to end this paper[19]. The quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system [4,12,14]. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits Le. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982[20]. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state Of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
引用
收藏
页码:1644 / 1648
页数:5
相关论文
共 50 条
  • [31] Composable security in relativistic quantum cryptography
    Vilasini, V.
    Portmann, Christopher
    del Rio, Lidia
    NEW JOURNAL OF PHYSICS, 2019, 21 (04)
  • [32] Security of quantum cryptography with realistic sources
    Lütkenhaus, N
    ACTA PHYSICA SLOVACA, 1999, 49 (04) : 549 - 556
  • [33] Bitcoin Security with Post Quantum Cryptography
    Semmouni, Meryem Cherkaoui
    Nitaj, Abderrahmane
    Belkasmi, Mostafa
    NETWORKED SYSTEMS, NETYS 2019, 2019, 11704 : 281 - 288
  • [34] Quantum cryptography: Security criteria reexamined
    Kaszlikowski, D
    Gopinathan, A
    Liang, YC
    Kwek, LC
    Englert, BG
    PHYSICAL REVIEW A, 2004, 70 (03): : 032306 - 1
  • [35] A Review on Quantum Cryptography Technology
    Techateerawat, Piya
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2010, 1 (01): : 35 - 41
  • [36] Error correction and security in quantum cryptography
    Lo, HK
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 481 - 481
  • [37] Security aspects of practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 289 - 299
  • [38] Security against eavesdropping in quantum cryptography
    Lutkenhaus, N
    PHYSICAL REVIEW A, 1996, 54 (01) : 97 - 111
  • [39] A Security Enhancement Approach in Quantum Cryptography
    Shrivastava, Akash
    Singh, Manvendra
    2012 5TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC), 2012,
  • [40] A Reliable Security Alternative: Quantum Cryptography
    Buenano, Hernando
    Guachimbosa, Victor H. V.
    Ruiz, Jaime
    Salazar Mera, Javier
    Sanchez Guerrero, Javier
    2019 SIXTH INTERNATIONAL CONFERENCE ON EDEMOCRACY & EGOVERNMENT (ICEDEG), 2019, : 357 - 361