Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on Various Aspects of Quantum Cryptography

R.K. Pateriya, Dr.J.L. Rana, Anupriya Gupta

Abstract


In the era of information technology the need for secure communication has become increasingly important. Cryptography is a technology for creating the core of information security we use cryptography for making data secure which is the science of information protection from unauthorized interception and tempering. Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts which are based either on factorization or on discrete logarithm problem. In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws, which provide protection of system security, and optimization of system efficiency and detects intrusion and wiretap. Today quantum cryptography is used in various application for transferring secure data without the fear of keys being compromised. This paper reviews the various areas where quantum  cryptography is successfully implemented, its advantages disadvantages & technical issues.

 


Keywords


Optical Fiber, Photon Polarization, Quantum Cryptography, Quantum Key Distribution.

Full Text:

PDF

References


Stallings.W;1999,”Cryptography and Network Security” Principles and Practice, 2nd ed. Upper Saddle River, NJ: Prentice Hall .

Yu Fang Chung, Zhen Yu Wu, Tzer Shyong Chen” Unconditionally secure cryptosystems based on quantum cryptography” Information Sciences 178(2008) 2044-2058

Veronica Fernadez, Karan J.Gordon, Robert j.Collins, Paul D.Townsend, Sergio D.Cova, Ivan Rech, Gerald S .buller “quqntum key distribution in a multi user network at Gigahertz Clock Rates” Proceedings of SPIE, Volume 5840, "Photonic Materials, Devices, and Applications", (2005)

Xiao Tang, Lijun Ma, Alan Mink, Tiejun Chang, Hai Xu, Oliver Slattery, Anastase Nakassis, Barry Hershman, David Su, and Ronald F. Boisvert “High-Speed Quantum Key Distribution Systems for Optical Fiber networks in campus and metro areas” Proceeding of SPIE Vol. 7092 70920I-1 2008

Mario Pivk, Christian Kollmitzer “SSL/TLS with Quantum Cryptography” pp.96-101 2009 Third International Conference on Quantum, Nano and Micro Technologies.

Mehrdad S. Sharbaf “Quantum Cryptography: A New Generation of Information Technology Security System”1644-1648

Las Vegas, NV 2009 Sixth International Conference on Information Technology.

Armand Niederberger, Valerio Scarani, Nicolas Gisin “Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography” Phys. Rev. A 71, 042316 (2005)

Dagmar Bruss, Gabor Erde Lyi, Tim Meyer, Tobias Riege, and Jo¨ Rg Rothe “Quantum Cryptography: A Survey” ACM Computing Surveys, Vol. 39, No. 2, Article 6, Publication date: June 2007.

Bing C. Wang “Multi-User Quantum Cryptography Networks” The 14th Annual Wireless and Optical Communications Conference - April 22-23, 2005, NJ, USA

Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, Srikanth V. Krishnamurthy “On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments” MobiCom’09, September 20–25, 2009, Beijing, China.

Jörgen Cederlöf and Jan-Åke Larsson “Security Aspects of the Authentication Used in Quantum Cryptography” IEEE Transactions On Information Theory, Volume. 54, NO. 4, Apr 2008.

Rajni Goel, Moses Garuba, Anteneh Girma “Research Directions in Quantum Cryptography” Pages: 779-784 International Conference on Information Technology (ITNG'07).

A.Falahati , Hadi Meshgi “Using Quantum Cryptography for securing Wireless LAN networks” pp.698-701 2009 International Conference on Signal Processing Systems.

[Stamatios V. Kartalopoulos “Identifying Vulnerabilities of Quantum Cryptography in Secure Optical Data Transport” Unclassified Proceedings of Milcom 2005,Atlantic city,Session: communication security

N. L¨utkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61, 052304 (2000).

A.Poppe, A. Fedrizzi, R. Ursin, H. R. B¨ohm, T. Lor¨unser, O. Maurhardt, M. Peev, M. Suda, C. Kurtsiefer, H. Weinfurter, T. Jennewein, T. Jennewein” Practical quantum key distribution with polarization entangled photons” Opt. Express 12, 3865-3871 (2004)

G. Brassard and L. Salvail, “Secret key reconciliation by public discussion,” Lecture Notes in Computer Science 765, 410–423 (1994).

Romain Alléaume, Jan Bouda, Cyril Branciard, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Länger, Anthony Leverrier, Norbert Lütkenhaus, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Grégoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger.” SECOQC White Paper on Quantum Key Distribution and Cryptography” quant-ph/0701168 Jan 22, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.