Free

Quantum Cryptography - Essay Example

Comments (0) Cite this document
Summary
5). A second strength of quantum code allocation is that one can use a more or less short input to produce ideally secure and arbitrary codes…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Quantum Cryptography
Read TextPreview

Extract of sample "Quantum Cryptography"

Running Head: QUANTUM CRYPTOGRAPHY QUANTUM CRYPTOGRAPHY By Quantum Cryptography
Quantum cryptography’s main strength is its predominantly good way of generating long, arbitrary codes (Cobourne and Cid, 2011, p. 5). A second strength of quantum code allocation is that one can use a more or less short input to produce ideally secure and arbitrary codes. This feature allows two users to share a secure code and validate the original quantum dialogue. Applying part of the product of this QKD term to validate an upcoming QKD term shows that the approaching session is also ideally secure. As a result, one can run QKD terms nearly continuously without losing security while expanding the first, short code. Both properties form a third strength of quantum cryptography in terms of security. This strong point occurs from every new QKD term code being free of all formerly used codes as this independence lowers the number of methods a criminal can infiltrate the system (Cobourne and Cid, 2011, p. 5).
A fourth strength is the future proofing of security offered by QKD. Even when a malefactor breaks through a cryptographic system at any indefinite period in the future, former messages conveyed through it stay secure (Cobourne and Cid, 2011, p. 5). Mathematics has demonstrated the absolute security of QKD networks. Even when dealing with a rival that has endless supplies of time and energy, security of QKD networks are unbreakable.
One weakness of quantum cryptography is that quantum mediums are only functional over limited space (Rothke, 2007, p. 1055). This is a technical weakness as it occurs when one evaluates the realities of QKD application. Today, quantum mediums cannot convey data quick enough to offer sufficient levels of service, which forms a second technical weakness. Thirdly, quantum optic gear is susceptible to attacks. Quantum cryptography requires costly setups for upholding quantum processing, which serves as a weakness for mathematics, computer, and physics researchers who cannot afford such infrastructure (Cobourne and Cid, 2011, p. 6).
Another weakness is the possibility of quantum cryptography “killing” mathematical progressions at any period in the future irrespective of quantum computing advancements (Rothke, 2007, p. 1055). Commercially, the promise of ideal security may not be a significant enough imperative for businesses to permit the cost of customized gear and infrastructure (Nano 2014). Since conventional cryptography offers more than sufficient security, businesses will consider the uncertain advantages of quantum cryptography an unworthy risk and weakness (Lydersen et al., 2010, p. 686).
Quantum cryptography is hackable when the QKD is built incorrectly. Hacking is possible by distorting a message once the hacker acquires the user’s secret code. Distorting a message needs the hacker to determine the factors of a figure that is the product of two extremely big prime numbers (Nano 2014). Normally, quantum cryptography makes these prime numbers ineffably big that the processing abilities of today’s computers would require more than the universe’s lifespan to crack it. However, weak codes are products hackers can use to factor these prime numbers with much less effort than normal computing power. In addition, a hacker can use an intense pulse to blind a sensor, making it incapable of seeing the photons that store the secret code (Lydersen et al., 2010, p. 686).
References
Cobourne S and Cid, C 2011, ‘Quantum key distribution: Awesome or pointless?’ Royal Holloway Series 2011, pp. 1-13.
Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, and Makarov, V 2010, ‘Hacking commercial quantum cryptography systems by tailored bright illumination’ Nature Photonics vol. 4, pp. 686–689, viewed 24 January 2015, http://www.nature.com/nphoton/journal/v4/n10/full/nphoton.2010.214.html
Nano 2014, Vulnerability in commercial quantum cryptography, Norwegian University of Science and Technology, viewed 24 January 2015, http://nanomagazine.co.uk/index.php?option=com_content&view=article&id=1011%3A vulnerability-in-commercial-quantum-cryptography&Itemid=159
Rothke B, 2007, ‘An Overview of Quantum Cryptography’ Information Security Management Handbook, Sixth Edition, pp. 1045–1057, viewed 24 January 2015, http://www.infosectoday.com/Understanding_Cryptography/Articles/Quantum_Cryptogr aphy.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1675064-quantum-cryptography
(Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words)
Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1675064-quantum-cryptography.
“Quantum Cryptography Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1675064-quantum-cryptography.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Quantum Cryptography

Cryptography & Coding

...an attribute or accurate without revealing the individual's identity or the individualities of group that person managed with (Kessler, 2009). Undeniable signatures comprise interactive protocols that permit the signer to establish an imitation as well as bound who would able to confirm the signature (Kessler, 2009). Deniable encryption expands standard encryption through making it unworkable and unattainable for a hacker/attacker to mathematically show the continuation of a plain text message. The technique digital mixes produce hard-to-trace connections and communication (Kessler, 2009). Quantum Cryptography The technology of Quantum cryptography utilizes the present...
14 Pages(3500 words)Essay

Quantum

...? Quantum Local-density approximation (LDA) Local-density approximations and the Perdew-Burke-Ernzerhof generalized gradient approximation are widelyused by physicists and chemists for electronic structure investigation of different body-systems. Local-density approximations (LDA) refer to “a certain class of approximations implemented to the exchange-correlation (XC) energy functional in  DFT, which are dependant on electronic density value at each point in space” (Parr and Weitao, 1994). In accordance with numerous researches in the field of DFT, local approximations can be yielded to the XC energy. Nevertheless, it is relevant to note that widely used local approximations were found in the homogeneous electron...
4 Pages(1000 words)Coursework

How Quantum Technology Will Improve Our Future

...directly into advanced efficiencies in the blend making our future lives to be comparatively more convenient as far as lighting is concern. Quantum future in money and security Quantum Cryptography has improved and will continue to advance our lives through money. With computers and more application of debit and credit cards, money has advanced from bills to virtual amounts that are characterized by numbers. Given that money would always be changed from one place to another, the concept of Quantum cryptography would be highly significant in this area particularly on the basis of security. In essence, Cryptography is the application of...
5 Pages(1250 words)Essay

Cryptography

...Error correction is an important concept in cryptography and computer science. They are used in various solutions in computer science. This paper will look at the application of fuzzy error correction in the field of communications. The main intention of an error correcting code is to allow a message to be transmitted in an intact manner over a channel which is noisy and still maintain a good state. This process is achieved by having a mapping of m to a string, c, which is longer than m, before transmission. The construction of c is done in such a way that there are elements which are redundant in it. This will, therefore, enable the receiver to reconstruct c even if some bits of c are corrupted by noise; the receiver...
4 Pages(1000 words)Research Paper

Cryptography Attacks

...?Cryptography Attacks Cryptography is a science of communication that specializes in secure communication in the presence of a third party commonly referred to as adversaries. According to the Oxford English dictionary, an adversary is an enemy or a person who poses an amount of risk to others. Cryptography is a science of secure communication using unique codes to disguise the information thereby making it inaccessible by third parties. Presumably, the American government has a several enemies all of which will do anything to access some of the information in the government databases (Oded, 2001). This is further compounded by the constant need for government agencies to share information over the common means of communication... that...
5 Pages(1250 words)Research Paper

Cryptography

...? Full Paper Table of Contents Cryptography …………………………………… Page 3- 6 Conclusion …………………………………… Page 6-7 References …………………………………… Page 7 Glossary of Terms …………………………………… Page 8 Cryptography Secure Socket Layer v3 The reason for using an open source operating systems is to customize and select appropriate technology that was set to default. In this rapidly changing digital world of advanced hackers, new prevention techniques are invented for maximum prevention along with minimizing risks. One cannot predict that the blowfish encryption algorithm will also be replaced by the new and more secure algorithm known as (Anonymous2007, 500-500) two fish that will also be replaced at some period of this information...
4 Pages(1000 words)Research Paper

Cryptography

...summarize the uses of basic cryptography in your organization. You will want to find out such things as whether you use checksums, disk encryption, VPNs (virtual private networks), link encryption and SSL for your Web site. Find out who's responsible for these tools Information and Computer Technology has facilitated countless aspects of the business process and has automated numerous work tasks. Its adoption by organisations and its subsequent integration into the business process have proven invaluable. At the same time, however, it has led to countless security issues and, as a rule of thumb, has imposed the imperatives of adopting cryptographic techniques and technologies by organisations who engage in any form of...
4 Pages(1000 words)Essay

Cryptography Application Methods

...Cryptography Application Methods Cryptography Application Methods Cryptography is the process of transforming a text that is clearinto incomprehensible format. Business enterprises predominantly use cryptography during their storage and transmission of messages carefully for reading by the intended recipients. Cryptography has several applications and methods. In the past, it was used in assuring secrecy. The authenticity of the sender and integrity of the media were secured through the use signatures, wax, and other physical attributions. However, the introduction of electronic transfer transformed the use of cryptography into electronic...
2 Pages(500 words)Research Paper

Quantum Technology

...Quantum Technology Number) November 18, (Faculty Quantum Technology Quantum technology is a new form of technology that harnesses quantum physics to gain functionality or performance. It transitions some of the stranger features of quantum mechanics into practical applications such as quantum computing, quantum cryptography, quantum simulation, quantum metrology, quantum sensing and quantum imaging. The wider field of information technology (IT) is currently focusing on quantum computing and cryptography...
2 Pages(500 words)Essay

Understanding Cryptography

...Understanding Cryptography. Number: Lecturer: Introduction. Internet communication, wireless networking, mobile computing, and cloud computing are some of the trends shaping the computing and communication industry. All organizations are embracing such new technologies in a bid to enhance their performance and gain a competitive edge. These technologies help the companies to achieve great milestones in data processing and communication (Cisco Inc., 2014). However, they have a great concern with regard to information and data security. This is where cryptography is used to secure and enhance security of data and information in the communication and wireless networks. Cryptography is somehow omnipresent going beyond the conventional... ...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Quantum Cryptography for FREE!

Contact Us