StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Quantum Cryptography - Essay Example

Cite this document
Summary
5). A second strength of quantum code allocation is that one can use a more or less short input to produce ideally secure and arbitrary codes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Quantum Cryptography
Read Text Preview

Extract of sample "Quantum Cryptography"

Running Head: QUANTUM CRYPTOGRAPHY QUANTUM CRYPTOGRAPHY By Quantum Cryptography Quantum cryptography’s main strength is its predominantly good way of generating long, arbitrary codes (Cobourne and Cid, 2011, p. 5). A second strength of quantum code allocation is that one can use a more or less short input to produce ideally secure and arbitrary codes. This feature allows two users to share a secure code and validate the original quantum dialogue. Applying part of the product of this QKD term to validate an upcoming QKD term shows that the approaching session is also ideally secure.

As a result, one can run QKD terms nearly continuously without losing security while expanding the first, short code. Both properties form a third strength of quantum cryptography in terms of security. This strong point occurs from every new QKD term code being free of all formerly used codes as this independence lowers the number of methods a criminal can infiltrate the system (Cobourne and Cid, 2011, p. 5). A fourth strength is the future proofing of security offered by QKD. Even when a malefactor breaks through a cryptographic system at any indefinite period in the future, former messages conveyed through it stay secure (Cobourne and Cid, 2011, p. 5). Mathematics has demonstrated the absolute security of QKD networks.

Even when dealing with a rival that has endless supplies of time and energy, security of QKD networks are unbreakable. One weakness of quantum cryptography is that quantum mediums are only functional over limited space (Rothke, 2007, p. 1055). This is a technical weakness as it occurs when one evaluates the realities of QKD application. Today, quantum mediums cannot convey data quick enough to offer sufficient levels of service, which forms a second technical weakness. Thirdly, quantum optic gear is susceptible to attacks.

Quantum cryptography requires costly setups for upholding quantum processing, which serves as a weakness for mathematics, computer, and physics researchers who cannot afford such infrastructure (Cobourne and Cid, 2011, p. 6). Another weakness is the possibility of quantum cryptography “killing” mathematical progressions at any period in the future irrespective of quantum computing advancements (Rothke, 2007, p. 1055). Commercially, the promise of ideal security may not be a significant enough imperative for businesses to permit the cost of customized gear and infrastructure (Nano 2014).

Since conventional cryptography offers more than sufficient security, businesses will consider the uncertain advantages of quantum cryptography an unworthy risk and weakness (Lydersen et al., 2010, p. 686). Quantum cryptography is hackable when the QKD is built incorrectly. Hacking is possible by distorting a message once the hacker acquires the user’s secret code. Distorting a message needs the hacker to determine the factors of a figure that is the product of two extremely big prime numbers (Nano 2014).

Normally, quantum cryptography makes these prime numbers ineffably big that the processing abilities of today’s computers would require more than the universe’s lifespan to crack it. However, weak codes are products hackers can use to factor these prime numbers with much less effort than normal computing power. In addition, a hacker can use an intense pulse to blind a sensor, making it incapable of seeing the photons that store the secret code (Lydersen et al., 2010, p. 686).ReferencesCobourne S and Cid, C 2011, ‘Quantum key distribution: Awesome or pointless?

’ Royal Holloway Series 2011, pp. 1-13.Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, and Makarov, V 2010, ‘Hacking commercial quantum cryptography systems by tailored bright illumination’ Nature Photonics vol. 4, pp. 686–689, viewed 24 January 2015, http://www.nature.com/nphoton/journal/v4/n10/full/nphoton.2010.214.htmlNano 2014, Vulnerability in commercial quantum cryptography, Norwegian University of Science and Technology, viewed 24 January 2015, http://nanomagazine.co.uk/index.php?

option=com_content&view=article&id=1011%3A vulnerability-in-commercial-quantum-cryptography&Itemid=159Rothke B, 2007, ‘An Overview of Quantum Cryptography’ Information Security Management Handbook, Sixth Edition, pp. 1045–1057, viewed 24 January 2015, http://www.infosectoday.com/Understanding_Cryptography/Articles/Quantum_Cryptogr aphy.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1675064-quantum-cryptography
(Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words)
Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1675064-quantum-cryptography.
“Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1675064-quantum-cryptography.
  • Cited: 0 times

CHECK THESE SAMPLES OF Quantum Cryptography

A Report on Quantum Computing

In addition, these systems can be used to break and detect complex cryptography and encryption codes.... This report outlines an overview of the quantum computing, which is a significant area of modern research.... It is aimed at developing computer based tools and machines based on the rules and regulations of quantum theory.... hellip; Additionally, the quantum theory refers to the performance and environment of material and energy on the quantum, both at the atomic and subatomic level....
3 Pages (750 words) Research Paper

Information Theory and Cryptography

This essay "Information Theory and cryptography" confines itself to just two concepts within cryptography – entropy and unicity distance – that it will treat at some length.... and cryptography.... cryptography is the art (or rather science) of writing in secret code and dates back to the ancient Egyptians (Kessler, Gary C.... and cryptography.... cryptography is the art (or rather science) of writing in secret code and dates back to the ancient Egyptians (Kessler, Gary C....
9 Pages (2250 words) Essay

The Uses of Basic Cryptography in My Organization

summarize the uses of basic cryptography in your organization.... cryptography is used for the protection of all data stored on the organisation's networks and servers.... As explained by Juels (2003) cryptography involves the encryption of data or their rendition into secret, indecipherable code, for the explicit prevention of their interpretation and use if they are accessed without the proper authorization....
4 Pages (1000 words) Essay

Computer Will the cost and power of personal computers continue on the current trend

The physicist Richard Feynman had proposed the concept of quantum computing twenty – six years ago.... Scientists are of the opinion that even the basic model personal computer in the years to come will have processors with much higher capacities.... It is assumed that these computers will incorporate… These future computers will have petabytes or 1024 terabytes of physical memory....
4 Pages (1000 words) Essay

Cryptographic Failures and Challenges

cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it.... The error enabled Cryptographic Failures and Challenges Affiliation cryptography is a technique used in keeping and passing on information in a particular outline such that, only for whom the data is proposed can understand and process it.... In conclusion, cryptography is very vital as it invention was meant on secrecy and, therefore, there should be some ways of ensuring that they uphold their mandate....
1 Pages (250 words) Assignment

Risks of Using the Internet

"Risks of Using the Internet" paper takes into consideration the myriad risks internet users face from cybercriminal activity around the world, and by examining what governments and internet builders are doing to get rid of or alleviate these problems.... hellip; Internet users must be vigilant enough to keep their computer's anti-virus software updated with the latest improvements....
5 Pages (1250 words) Coursework

IPSec and Cryptography

The paper "IPSec and cryptography" offers a clear discussion of the major functions of IPsec in relation to the cryptographic functions employed by the protocol suite during the packet exchange process.... cryptography refers to the change of plaintext information into a coded form.... nbsp; The aim of cryptography is to offer the necessary security and frontier access to private information....
6 Pages (1500 words) Essay

The History of Information Security

The traditional information security techniques that were used in ancient Egypt such as data hiding, watermarking, and cryptography, are some of the basic notions, and they do play a significant role in the development of the information security sector algorithms and solutions.... The following paper under the title 'The History of Information Security' gives detailed information about security that has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers....
5 Pages (1250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us