CFP last date
20 December 2024
Reseach Article

Contemporary Cryptography and Arguments for Classical Cryptography’s Endurance alongside the Propitious Quantum Cryptography

by R.Sakthi Vignesh, S.Sudharssun, K.J.Jegadish kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 26
Year of Publication: 2010
Authors: R.Sakthi Vignesh, S.Sudharssun, K.J.Jegadish kumar
10.5120/479-786

R.Sakthi Vignesh, S.Sudharssun, K.J.Jegadish kumar . Contemporary Cryptography and Arguments for Classical Cryptography’s Endurance alongside the Propitious Quantum Cryptography. International Journal of Computer Applications. 1, 26 ( February 2010), 57-62. DOI=10.5120/479-786

@article{ 10.5120/479-786,
author = { R.Sakthi Vignesh, S.Sudharssun, K.J.Jegadish kumar },
title = { Contemporary Cryptography and Arguments for Classical Cryptography’s Endurance alongside the Propitious Quantum Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 26 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 57-62 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number26/479-786/ },
doi = { 10.5120/479-786 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:51.811634+05:30
%A R.Sakthi Vignesh
%A S.Sudharssun
%A K.J.Jegadish kumar
%T Contemporary Cryptography and Arguments for Classical Cryptography’s Endurance alongside the Propitious Quantum Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 26
%P 57-62
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pursue with the discussion about the potency of classical cryptography and its splendid capabilities in providing security.

References
  1. 1. A Los Alamos National Laboratory http://www.physorg.com/news86020679.html
  2. 2. C. Bennett and G. Brassard, in Proceedings of IEEE,International Conference on Computers, Systems
  3. 3. Eric Weisstein's World of Science on Birefringence http://scienceworld.wolfram.com/physics/Birefringence.html
  4. 4. Identifying vulnerabilities of quantum cryptography in secure optical data transport Stamatios V. Kartalopoulos, PhD,Williams Professor in Telecommunications Networking, The University of Oklahoma
  5. 5. Quantum Cryptography: Public Key Distribution And Coin Tossing: Charles H. Bennett (IBM Research, Yorktown Heights NY 10598 USA) & Gilles Brassard (dept. IRO, Univ. de Motreal, H3C 3J7 Canada)
  6. 6. N. Lutkenhaus, Phys. Rev. A 61, 052304 (2000); G. Brassard, N. Lutkenhaus, T. Mor, B.C. Sanders, Phys. Rev. Lett. 85, 1330 (2000).
  7. 7. Los Alamos National Laboratory http://www.physorg.com/news86020679.htmlC. Bennett and G. Brassard, in Proceedings of IEEE,International Conference on Computers, Systems
  8. 8. G. Ribordy, J.-D. Gautier, N. Gisin, O. Guinnard, Electronics Letters 34, 2116 (1998)
  9. 9. W.F. Ehrsam, C.H.W. Meyer, and W.L. Tuchman, "A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard," IBM Systems Journal, v. 17, n. 2, 1978, pp. 106-125.
  10. 10. Optimal cloning of single-photon polarization by coherent feedback of beam splitter losses Holger F Hofmann and Toshiki Ide
  11. 11. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) Author(s): Bruce Schneier
  12. 12. W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, v. IT-22, n. 6, Nov 1976, pp. 644-654.
  13. 13. R.L. Rivest, "Dr. Ron Rivest on the Difficulty of Factoring," Ciphertext: The RSA Newsletter, v. 1, n. 1, Fall 1993, pp. 6, 8.
  14. 14. Information Security Management Handbook By Harold F. Tipton, Micki Kraus
  15. 15. Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo: "Experimental demonstration of time-shift attack against practical quantum key distribution systems", arXiv:0704.3253
Index Terms

Computer Science
Information Sciences

Keywords

quantum cryptography classical cryptography