CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Survey on Different Visions with Contrasting Quantum and Traditional Cryptography

by S.C. Jain, Nitesh Chouhan, Hemant Kumar Saini
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 134 - Number 8
Year of Publication: 2016
Authors: S.C. Jain, Nitesh Chouhan, Hemant Kumar Saini
10.5120/ijca2016907965

S.C. Jain, Nitesh Chouhan, Hemant Kumar Saini . A Survey on Different Visions with Contrasting Quantum and Traditional Cryptography. International Journal of Computer Applications. 134, 8 ( January 2016), 33-38. DOI=10.5120/ijca2016907965

@article{ 10.5120/ijca2016907965,
author = { S.C. Jain, Nitesh Chouhan, Hemant Kumar Saini },
title = { A Survey on Different Visions with Contrasting Quantum and Traditional Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 134 },
number = { 8 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume134/number8/23937-2016907965/ },
doi = { 10.5120/ijca2016907965 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:33:40.456947+05:30
%A S.C. Jain
%A Nitesh Chouhan
%A Hemant Kumar Saini
%T A Survey on Different Visions with Contrasting Quantum and Traditional Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 134
%N 8
%P 33-38
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum cryptography is a knowledge that guarantees ultimate safety. Associated to present cryptography that might be overcome by the expansion of an ultra-high-speed computer, quantum cryptography safeguards secure message since it is founded on the important bodily laws. It is an emergent technology in which two parties may concurrently produce shared, secret cryptographic key substantial using the broadcast of quantum conditions of light. Quantum cryptography is a novel way for secret communications present the final security pledge of the holiness of a Law of Nature. The quantum cryptography conviction on two innermost rudiments of quantum technicalities-the Heisenberg Uncertainty attitude and the standard of photon partition[19]. This research paper distillates on the trust of quantum cryptography, and in what method this knowledge contribute to the system security. This paper tactics the real world demand procedure of this know-how and the future itinerary in which quantum cryptography hasten.

References
  1. C. Bennett and G. Brassard, in Proceedings of IEEE, International Conference on Computers, Systems .
  2. Hughes, Richard J., D.M. Alde, P. Dyer, G.G. Luther, G.L. Morgan, and M. Schauer, Quantum cryptography, Contemporary Physics, Vol. 36, No. 3 (1995)..
  3. Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C (cloth) Author(s): Bruce Schneier.
  4. FIPS. 46-3, ‘“Data Encryption Standard,” Federal Information Processing Standard (FIPS), Publication 46-3, National Bureau of Standards, US. Department of Commerce, Washington D.C., October 25, 1999. R.L. Rivest, “Dr. Ron Rivest on the Difficulty of Factoring,” Cipher text: The RSA Newsletter, v. 1, n. 1, fall 1993, pp. 6-8.
  5. G. R. Blakley, “One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.” , Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980, pp. 108-113.
  6. Tan, Xiaoqing. "Introduction to quantum cryptography." Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN (2013): 978- 953.
  7. Wheeler, John Archibald, and Wojciech Hubert Zurek, eds. Quantum theory and measurement. Princeton University Press, 2014.
  8. Chung, Yu Fang, Zhen Yu Wu, and Tzer Shyong Chen. "Unconditionally secure cryptosystems based on quantum cryptography." Information Sciences 178.8 (2008): 2044-2058.
  9. Singh, Hitesh, et al. "Quantum Key Distribution Protocols: A Review." Journal of Computational Information Systems 8.7 (2012): 2839-2849
  10. Zhao, Yi, et al. "Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems." Physical Review A 78.4 (2008): 042333
  11. Wiechers, Carlos, et al. "After-gate attack on a quantum cryptosystem." New Journal of Physics 13.1 (2011): 013043.
  12. Wiechers C, Lydersen L, Wittmann C, Elser D, Skaar J, Marquardt Ch, Makarov V and Leuchs G, 2011, Aftergate attack on quantum cryptosystem, New Journal of Physics 13, 013043.
  13. NIST: Hark! Group Demonstrates First Heralded Single Photon Source Made from Silicon http://www.nist.gov/cnst/herald-062712.cfm.
  14. Hwang, Won-Young. "Quantum key distribution with high loss: Toward global secure communication." Physical Review Letters 91.5 (2003): 057901.
  15. Johny, Shiji, and Anil Antony. "A Review on BB84 Protocol in Quantum Cryptography.
  16. Rubya, T., N. Prema Latha, and B. Sangeetha. "A survey on recent security trends using quantum cryptography." IJCSE 2.9 (2010): 3038-3042
  17. Lo, Hoi-Kwong, and Yi Zhao. "Quantum cryptography." Encyclopedia of Complexity and Systems Science (2009): 7265-7289.
  18. Teja, V.; Banerjee, P.; Sharma, N.N.; Mittal, R.K., "Quantum cryptography: State-of-art, challenges and future perspectives," in Nanotechnology, 2007. IEEE-NANO 2007. 7th IEEE Conference on , vol., no., pp.1296-1301, 2-5 Aug. 2007. doi: 10.1109/NANO.2007.4601420
  19. Miss. Payal P. Kilor, Mr.Pravin.D.Soni,” Quantum Cryptography: Realizing next generation information security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 3, Issue 2, February 2014 .ISSN 2319 – 4847.
Index Terms

Computer Science
Information Sciences

Keywords

Quantum cryptography Classical cryptography Polarization states.