Quantum Cryptography Key Distribution: Quantum Computing

Quantum Cryptography Key Distribution: Quantum Computing

Bhanu Chander
Copyright: © 2020 |Pages: 25
DOI: 10.4018/978-1-7998-2253-0.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.
Chapter Preview
Top

Introduction

Cryptography is learning process for transfer secret information or intelligence by using mathematical operations, only applying secret or specific key the intended receipts can read or gets the original message. The message which is revolved around a masquerading structure process is called encryption. Converting masquerading text messages to plain text is called decryption. The key which makes plain text to cipher text is called the encryption key, coming to the receiver’s end the key which makes cipher text to plain text is called the decryption key. Our standing statement will be that any time a person sends a message, that person has to send it over an unrestricted medium, so that anybody who wishes can pick it up. So, the eavesdropper can take delivery of any message that A and B send to each other. The point, then, is to make it so that even though eavesdropper can see the message, it just looks like twaddle to her/him: she can’t right to use the content of the message. Cryptography is the encounter among A and B on one track and eavesdropper on the other track. In a variety of times in the past, A and B have had the superior hand. At other times, the eavesdropper has been on top. At the current scenario, it seems that A and B are winning, but eavesdropper is inflexible at work trying to recapture her/his lead.

In cryptography, the procedures which are apply to shield information are achieved from mathematical theories and a set-of-rule based computations acknowledged as algorithms to translate messages in ways that create it tough to decode it. These algorithms are exploiting for cryptographic key generation, digital signing, and certification to protect data privacy, web browsing on internet and to shelter top secret dealings like credit and debit card dealings. The uncertainty law of quantum physics fabricates the most primitive fundamentals for quantum cryptography. Through quantum computers future being estimated to answer discrete logarithmic crisis as well as the commonly known cryptography schemes like AES, RSA, DES, quantum cryptography turn out to be the forecasted solution. In observation it is exploit to set-up a mutual, secret along with arbitrary sequence of bits to communicate among two arrangements, for instance take A and B. This set-up is acknowledged as Quantum Key Distribution. Subsequent to this key is shared among A and B, additional swapping of information can take place in the course of well-known cryptographic techniques.

In cryptography main role taken by keys, based on the chosen key cryptography split into two styles Symmetric or secret-key cryptography and Asymmetric key or public-key cryptography (Bennett and Brassard, 1987; Ekert 1991; Zhao and Qi, 2006; Padmavathi and Vishnu, 2016; NIST, 2016).

  • Secret Key Cryptosystem: In secret-key cryptography, just a single key is shared within dispatcher as well as the recipient that key sustain for encryption as well as decryption which will keep as secret. That’s the reason to call it a secret key or symmetric key cryptography. Security mainly established on problematical nonproven algorithms, most importantly it depends upon protected medium on behalf of key distribution.

  • Public Key Cryptosystem: In asymmetric cryptography, two keys are used public and private keys, the private key is used to encrypt the messages and the public key is used to decrypt the encrypted message. Security is based on computational mathematical assumptions, most of the security algorithms found on non-proven mathematical assumptions.

Complete Chapter List

Search this Book:
Reset