Quantum Cryptography: A New Generation of Information Technology Security System

被引:15
|
作者
Sharbaf, Mehrdad S. [1 ]
机构
[1] Nova SE Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
关键词
network security; quantum cryptography; quantum key distribution; photon polarization; quantum network;
D O I
10.1109/ITNG.2009.173
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote" Conjugate Coding", which took more than ten years to end this paper[19]. The quantum cryptography relies on two important elements of quantum mechanics-the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system [4,12,14]. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits Le. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982[20]. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state Of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
引用
收藏
页码:1644 / 1648
页数:5
相关论文
共 50 条
  • [1] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    [J]. TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [2] Information technology security using cryptography
    Sanchez-Reillo, R
    Lopez-Ongil, C
    Entrena-Arrontes, L
    Sanchez-Avila, C
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2003, 18 (06) : 21 - 24
  • [3] Bounds on information and the security of quantum cryptography
    Biham, E
    Mor, T
    [J]. PHYSICAL REVIEW LETTERS, 1997, 79 (20) : 4034 - 4037
  • [4] Trends in information security technology - Cryptography in the limelight
    Suzuki, M
    Hayashi, S
    Murata, Y
    [J]. NTT REVIEW, 1996, 8 (01): : 24 - 31
  • [5] Quantum Cryptography: A way of Improving Security of Information
    Panhwar, Muhammad Aamir
    Khuhro, Sijjad Ali
    Mazhar, Tehseen
    Deng ZhongLiang
    Qadir, Nabeel
    [J]. INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01): : 9 - 21
  • [6] Quantum Cryptography Trends: A Milestone in Information Security
    Noor-ul-Ain, W.
    Atta-ur-Rahman, M.
    Nadeem, Muhammad
    Abbasi, Abdul Ghafoor
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2015, 2016, 420 : 25 - 39
  • [7] Quantum information processing - Quantum cryptography toward ultimate security
    Shimizu, K
    Imoto, N
    [J]. NTT REVIEW, 2000, 12 (01): : 26 - 31
  • [8] Security technologieson image information (8); quantum cryptography
    Tsurumaru, Toyohiro
    [J]. Kyokai Joho Imeji Zasshi/Journal of the Institute of Image Information and Television Engineers, 2015, 69 (11): : 889 - 897
  • [9] Information complementarity in multipartite quantum states and security in cryptography
    Bera, Anindita
    Kumar, Asutosh
    Rakshit, Debraj
    Prabhu, R.
    Sen , Aditi
    Sen, Ujjwal
    [J]. PHYSICAL REVIEW A, 2016, 93 (03)
  • [10] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    [J]. Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7