Quantum cryptography: An emerging technology in network security

@article{Sharbaf2011QuantumCA,
  title={Quantum cryptography: An emerging technology in network security},
  author={Mehrdad Sepehri Sharbaf},
  journal={2011 IEEE International Conference on Technologies for Homeland Security (HST)},
  year={2011},
  pages={13-19}
}
  • M. Sharbaf
  • Published 19 December 2011
  • Computer Science, Mathematics
  • 2011 IEEE International Conference on Technologies for Homeland Security (HST)
The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key… 

Figures from this paper

Quality Analysis of Network Security Using Cryptographic Techniques
TLDR
This paper has given an extensive mixture of different calculations and systems, for example, Triple DES, BREA, AES, Elliptic Curve Cryptography, CryptoStegnography, Dual RSA, Stream and Block figures, GPS satirizing and Quantum Cryptography through which information will be secured.
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
TLDR
This paper discusses the process of creating a secret key using quantum mechanics and cryptography methods, explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem.
Quantum Cryptography Protocols for IOE Security: A Perspective
TLDR
All aspects of quantum key distribution which are major primitive for Quantum Cryptography along with Quantum Key Distribution Protocols used for developing IoE security are dealt with.
The AES-256 Cryptosystem Resists Quantum Attacks
TLDR
The proof of AES-256 using Grover’s algorithm which can resist quantum is depicted and it is shown that this algorithm can resist conventional computers as well as quantum computers.
Software Quality Assurance in Network Security Using Cryptographic Techniques
TLDR
Certain cryptographic techniques are discussed which have shown far better improvement in the network security with enhanced quality assurance and their possible solutions based on the new cryptosystems.
COMPARATIVE STUDY OF CLASSICAL AND QUANTUM CRYPTOGRAPHY APPROACHES: REVIEW AND CRITICAL ANALYSIS
TLDR
This paper studies both approaches, their advantages, disadvantages, and their expected future, and exposes the basic principles of Quantum Cryptography as well as its protocols and predicts which approach will dominate the world of information security in the far future.
Leveraging the power of quantum computing for breaking RSA encryption
TLDR
A novel approach is provided to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication.
Quantum Key Distribution using Different Techniques and Algorithms
TLDR
This research paper concentrates on techniques and algorithms proposed in quantum cryptography with their comparison and contribution in network security.
Quantum Cryptography
TLDR
The chapter covers the details of the basic principles and work methodology of quantum cryptography, the contribution of various pioneers, advantages over classical cryptography, its applications, future scope, and limitations simultaneously.
Advances in quantum key distribution and quantum randomness generation
TLDR
This thesis discusses some progress in quantum key distribution and quantum randomness generation, and presents a study on reference-frame-independent protocols whose knowledge can help design more efficient protocols, and a framework to the security analysis of distributed-phase-reference protocols, which have been missing for many years.
...
...

References

SHOWING 1-10 OF 32 REFERENCES
Quantum Cryptography: A New Generation of Information Technology Security System
  • M. Sharbaf
  • Computer Science, Physics
    2009 Sixth International Conference on Information Technology: New Generations
  • 2009
TLDR
This research paper summarizes the current state of quantum cryptography, and the real–world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
Quantum cryptography in practice
TLDR
This paper introduces quantum cryptography, discusses its relation to modern secure networks, and describes its unusual physical layer, its specialized quantum cryptographic protocol suite, and the extensions to IPsec to integrate it with quantum cryptography.
Quantum cryptography: State-of-art, challenges and future perspectives
TLDR
This paper aims at familiarizing the reader with the field of quantum cryptography and gives an insight about the latest developments in the field.
Quantum Cryptography
TLDR
A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace.
An introduction to quantum cryptography
TLDR
Cryptography was the art of outsmarting a human enemy; today it is concerned more with resisting attack by very powerful computers, which will make these systems more vulnerable to attack.
Quantum Cryptography and Security of Information Systems
TLDR
The concept of BB84 quantum key distribution (QKD) protocol is shown and its use as an information system is analyzed and the difference between classical and quantum cryptography is presented.
Communication theory of secrecy systems
  • C. Shannon
  • Computer Science, Mathematics
    Bell Syst. Tech. J.
  • 1949
TLDR
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Some facets of complexity theory and cryptography: A five-lecture tutorial
  • J. Rothe
  • Computer Science, Mathematics
    CSUR
  • 2002
TLDR
This tutorial discusses the notion of one-way functions both in a cryptographic and in a complexity-theoretic setting, and considers interactive proof systems and some interesting zero-knowledge protocols.
Symmetric and Asymmetric Encryption
TLDR
This paper opens with a brmf dmcussion of encryptmn principles and then proceeds to a comprehensive discussion of the asymmetric encryptmn/decryp tion channel and its application m secure communmations.
Experimental Quantum Cryptography
TLDR
An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
...
...