# Quantum cryptography: An emerging technology in network security

@article{Sharbaf2011QuantumCA, title={Quantum cryptography: An emerging technology in network security}, author={Mehrdad Sepehri Sharbaf}, journal={2011 IEEE International Conference on Technologies for Homeland Security (HST)}, year={2011}, pages={13-19} }

The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key…

## 32 Citations

Quality Analysis of Network Security Using Cryptographic Techniques

- Computer Science, Mathematics
- 2015

This paper has given an extensive mixture of different calculations and systems, for example, Triple DES, BREA, AES, Elliptic Curve Cryptography, CryptoStegnography, Dual RSA, Stream and Block figures, GPS satirizing and Quantum Cryptography through which information will be secured.

Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review

- Computer Science, MathematicsCryptogr.
- 2022

This paper discusses the process of creating a secret key using quantum mechanics and cryptography methods, explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem.

Quantum Cryptography Protocols for IOE Security: A Perspective

- Computer Science
- 2019

All aspects of quantum key distribution which are major primitive for Quantum Cryptography along with Quantum Key Distribution Protocols used for developing IoE security are dealt with.

The AES-256 Cryptosystem Resists Quantum Attacks

- Computer Science, Mathematics
- 2017

The proof of AES-256 using Grover’s algorithm which can resist quantum is depicted and it is shown that this algorithm can resist conventional computers as well as quantum computers.

Software Quality Assurance in Network Security Using Cryptographic Techniques

- Computer Science, Mathematics
- 2015

Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.

COMPARATIVE STUDY OF CLASSICAL AND QUANTUM CRYPTOGRAPHY APPROACHES: REVIEW AND CRITICAL ANALYSIS

- Computer Science, Mathematics
- 2013

This paper studies both approaches, their advantages, disadvantages, and their expected future, and exposes the basic principles of Quantum Cryptography as well as its protocols and predicts which approach will dominate the world of information security in the far future.

Leveraging the power of quantum computing for breaking RSA encryption

- Computer Science
- 2020

A novel approach is provided to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication.

Quantum Key Distribution using Different Techniques and Algorithms

- Computer Science, Mathematics
- 2014

This research paper concentrates on techniques and algorithms proposed in quantum cryptography with their comparison and contribution in network security.

Quantum Cryptography

- Computer Science, PhysicsLimitations and Future Applications of Quantum Cryptography
- 2021

The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously.

Advances in quantum key distribution and quantum randomness generation

- Computer Science
- 2015

This thesis discusses some progress in quantum key distribution and quantum randomness generation, and presents a study on reference-frame-independent protocols whose knowledge can help design more efficient protocols, and a framework to the security analysis of distributed-phase-reference protocols, which have been missing for many years.

## References

SHOWING 1-10 OF 32 REFERENCES

Quantum Cryptography: A New Generation of Information Technology Security System

- Computer Science, Physics2009 Sixth International Conference on Information Technology: New Generations
- 2009

This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.

Quantum cryptography in practice

- Computer ScienceSIGCOMM '03
- 2003

This paper introduces quantum cryptography, discusses its relation to modern secure networks, and describes its unusual physical layer, its specialized quantum cryptographic protocol suite, and the extensions to IPsec to integrate it with quantum cryptography.

Quantum cryptography: State-of-art, challenges and future perspectives

- Computer Science, Physics2007 7th IEEE Conference on Nanotechnology (IEEE NANO)
- 2007

This paper aims at familiarizing the reader with the field of quantum cryptography and gives an insight about the latest developments in the field.

Quantum Cryptography

- Computer ScienceEncyclopedia of Cryptography and Security
- 2005

A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace.

An introduction to quantum cryptography

- Computer Science, MathematicsCROS
- 2005

Cryptography was the art of outsmarting a human enemy; today it is concerned more with resisting attack by very powerful computers, which will make these systems more vulnerable to attack.

Quantum Cryptography and Security of Information Systems

- Computer Science, Mathematics
- 2004

The concept of BB84 quantum key distribution (QKD) protocol is shown and its use as an information system is analyzed and the difference between classical and quantum cryptography is presented.

Communication theory of secrecy systems

- Computer Science, MathematicsBell Syst. Tech. J.
- 1949

A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.

Some facets of complexity theory and cryptography: A five-lecture tutorial

- Computer Science, MathematicsCSUR
- 2002

This tutorial discusses the notion of one-way functions both in a cryptographic and in a complexity-theoretic setting, and considers interactive proof systems and some interesting zero-knowledge protocols.

Symmetric and Asymmetric Encryption

- Computer ScienceCSUR
- 1979

This paper opens with a brmf dmcussion of encryptmn principles and then proceeds to a comprehensive discussion of the asymmetric encryptmn/decryp tion channel and its application m secure communmations.

Experimental Quantum Cryptography

- Computer ScienceEUROCRYPT
- 1990

An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.