Quantum Cryptography Key Distribution: Quantum Computing

Quantum Cryptography Key Distribution: Quantum Computing

Bhanu Chander
Copyright: © 2020 |Pages: 25
ISBN13: 9781799822530|ISBN10: 1799822532|ISBN13 Softcover: 9781799822547|EISBN13: 9781799822554
DOI: 10.4018/978-1-7998-2253-0.ch005
Cite Chapter Cite Chapter

MLA

Chander, Bhanu. "Quantum Cryptography Key Distribution: Quantum Computing." Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, IGI Global, 2020, pp. 84-108. https://doi.org/10.4018/978-1-7998-2253-0.ch005

APA

Chander, B. (2020). Quantum Cryptography Key Distribution: Quantum Computing. In N. Chaubey & B. Prajapati (Eds.), Quantum Cryptography and the Future of Cyber Security (pp. 84-108). IGI Global. https://doi.org/10.4018/978-1-7998-2253-0.ch005

Chicago

Chander, Bhanu. "Quantum Cryptography Key Distribution: Quantum Computing." In Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, 84-108. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2253-0.ch005

Export Reference

Mendeley
Favorite

Abstract

Quantum cryptography is actions to protect transactions through executing the circumstance of quantum physics. Up-to-the-minute cryptography builds security over the primitive ability of fragmenting enormous numbers into relevant primes; however, it features inconvenience with ever-increasing machine computing power along with current mathematical evolution. Among all the disputes, key distribution is the most important trouble in classical cryptography. Quantum cryptography endows with clandestine communication by means of offering a definitive protection statement with the rule of the atmosphere. Exploit quantum mechanics to cryptography can be enlarging unrestricted, unfailing information transmission. This chapter describes the contemporary state of classical cryptography along with the fundamentals of quantum cryptography, quantum protocol key distribution, implementation criteria, quantum protocol suite, quantum resistant cryptography, and large-scale quantum key challenges.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.