Preview

Quantum Cryptography

Better Essays
Open Document
Open Document
1404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Quantum Cryptography
QUANTUM CRYPTOGRAPHY

Arka Deb, Nagaraja.H, Noor Afshan Fathima

III sem Computer Science and Engineering
P E S College of Engineering Mandya, India. mr.arkadeb@rediffmail.com afshan.shokath@gmail.com nagraj.hpk@gmail.com

Keywords— Cryptography, Quantum Cryptography, Photons, Polarization, Key.

I. Introduction Privacy is paramount when communicating sensitive information, and humans have invented some unusual ways to encode their conversations. Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems. The goal of quantum cryptology is to thwart attempts by a third party to eavesdrop on the encrypted message.

II. QUANTUM CRYPTOGRAPHY Cryptology is the process of encoding (cryptography) and decoding (crypto analysis) information or messages (called plaintext). All of these processes combined are cryptology. Earlier cryptology was based on algorithms -- a mathematical process or procedure which were created by a sender and transmitted to a receiver. These algorithms are used in conjunction with a key, a collection of bits (usually numbers). Without the proper key, it 's virtually impossible to decipher an encoded message, even if you know what algorithm to use. In modern cryptology, the third party (adversaries) can passively intercept sender and receiver’s encrypted message -- he can get his hands on the encrypted message and work to decode it without the sender and receiver knowing he has their message. The adversary can accomplish this in different ways, such as wiretapping sender or receiver’s phone or reading secure e-mails. Quantum cryptology is the first cryptology that safeguards against passive interception as photons come into play. Since we can 't measure a photon without affecting its behaviour, Heisenberg 's Uncertainty Principle emerges when the third



References: 1] Security of continuous variable quantum key distribution- A. Leverrier, E. Karpov, P. Grangier and N.J. Cerf J. 2] Optical Networking for Quantum key Distribution and Quantum Communication.- T.E Chapuran, N.A. Peter, Jackle and M.S. Goodman. 3] Engineering Physics-P Basavaraju 4] Wikipedia 5] www.howstuffworks.com

You May Also Find These Documents Helpful

  • Powerful Essays

    Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    LYT2 Task2

    • 4061 Words
    • 12 Pages

    This article proposes designing and measuring a single flux quantum circuits for switching data at 2.5Gbps. This is by use of a switching node that is helpful in the formation of a larger switching fabric. This is helpful in routing data quickly based on the bits that are present in the data streams. This solution in the NHS scenario since it can help route the imaging files data in an active input line when the other is idle.…

    • 4061 Words
    • 12 Pages
    Satisfactory Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Message coded – when the idea has been thought through, there is a thought process of how this idea is going to then be communicated. There is a thought as to how this message is going to express it, as it could be through language, writing, sign or symbols or whatever it may be.…

    • 778 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Wealthy noble families began to gain extreme power as foolish and corrupt emperors led to a decrease in the government’s power. Wang Mang, a reformist official, took the Han court’s power and attempted to establish the Xin dynasty. However, he was killed before he could actually carry out the reforms he had planned. After his death, a strong leadership was established for some time. During this time, the court tried to redistribute land to the free farmers who had been forced to become tenants; and they also tried to decrease land taxes. Also, food production increased. But unease among the peasants continued due to weak and corrupt rules and the wealthy’s power over the land. Nomadic raids by the Xiongnu…

    • 180 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Comm 1310 Exam 1

    • 4222 Words
    • 17 Pages

    Decoding- The process of interpreting ideas, feelings, and thoughts that have been translated into a code. Words and unspoken signals are interpreted by the receiver…

    • 4222 Words
    • 17 Pages
    Satisfactory Essays
  • Better Essays

    We have a fundamental need for privacy because all of us have things that we want to hide from others. For example, we may be involved in a crime intentionally sometimes. When we download songs online and share them to others, we are violating the Digital Millennium Copyright Act. This will surely cause a lot of troubles for us. Fortunately, with the aid of privacy, we can hide our transgressions and get rid of the trouble. Not only can privacy help us hide something bad, but it can also help us hide something secret. In the article “Why Privacy Matters Even If You Have Nothing To Hide,” Daniel J. Solove shares an example that all of us will not want to show others our naked photos (342). This is a strong example to show we need privacy for hiding things other than bad things from others. It is impossible for a human being to have nothing to hide and our lives are surely being bothered by government’s…

    • 1062 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    UNIT 501

    • 3497 Words
    • 10 Pages

    In 1948, Shannon was an American mathematician, Electronic engineer and Weaver was an American scientist both of them join together to write an article in “Bell System Technical Journal” called “A Mathematical Theory of Communication” and also called as “Shannon-Weaver model of communication”.…

    • 3497 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 3 Review

    • 1240 Words
    • 4 Pages

    Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from unsanctioned intrusion”.…

    • 1240 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    A powerful tool to work with our unconscious/subconscious selves and a phenomenal way to get exactly what we want in life, is to map out and create our quantum universes.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    In an information security context, privacy is not absolute freedom from observation, but rather it is a more precise state of being free from unsanctioned intrusion.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There is an old real-estate joke about the three most important factors in the business of realty, the punch line being “Location Location Location”. Though made in jest this idea is not far from the truth since the area in which any business type organization is established will typically play a big part in its overall success. On a much bigger scale the success of any business is also greatly dependant on the state of the global environment as well. Trends in culture and practices from other organizations will all ultimately have a huge impact on the way a business functions. It is the focus of this paper to explore the relationship between any business type organizations and the environments that influence its success both short term and long term.…

    • 2792 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Social Loafing

    • 665 Words
    • 3 Pages

    The common problem when working in a group is social loafing. “Social loafing is the tendency for individuals to expend less effort when working collectively than when working individually.”(pg.299) The best way to discourage social loafers is limit the group size, holding each individual responsible for their part, and setting group goals. One of the common stereotypes about groups is that team work intimates individual effort and increases the groups’ capacity to achieve its goals. However, in late 1920s, German psychologist names Max Ringelmann did a rope-pulling experiment on groups. He assumed that the group of three would pull three times as much as one person, and group of eight would pull eight times as much as one person. He came to a conclusion that more people in the group may be better for the total productivity, but the individual’s productivity of each group member declines.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Have you ever watched an episode of Star Trek and wondered if the possibility of teleportation existed in real life? Well, the good news is that it’s real! In 2008 for the first time ever in history, a team of scientists from the Joint Quantum Institute (JQI) at the University of Maryland was able to successfully teleport information directly from one atom to another over the distance of a meter. While this accomplishment isn’t as impressive as teleporting an actual human being, it’s still a significant scientific breakthrough that could lead to many possible future innovations.…

    • 1138 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Second fundamental problem for less communication is that we might take more efforts to complete a task or solve a problem, moreover fail and lost in the assignment. For instance, the famous scientist—Albert Einstein, who found the special relativity and led a new century of quantum mechanics, had benefited from communication. During the time that he was miserable about how the atom moves and the accurate measurement of both situation and momentum of an atom, a meeting among all these forward physical scientists stimulates his genius. Exchanging of others’ attitudes arise up his suspicious of Newton’s classical mechanics. Then he transformed his point to a new hypothesis—which is now called quantum mechanics. We may not ignore the efforts he spent on this theory, however, it is our duty to take a glance of the communication during that seminar.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays