129
views
0
recommends
+1 Recommend
1 collections
    0
    shares
       
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Quantum Cryptography

      research-article

        1 ,

      ScienceOpen Posters

      ScienceOpen

      Quantum cryptography , Cryptography

      Bookmark

            Abstract

            Nowadays, information is exchanged among the computer network. These data and information are involved in the business, military, academic education, research and etc. which are shared around the world in both private and public networks. Since, many categories of data are required restriction on the authorization of access, modify, delete, and insert, security in communication is increasingly important to network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use a security attack with a high-performance computer (e.g. quantum computer), an attacker can find a key and then obtains the data infeasible period. Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper. Quantum cryptography is improved significantly in the last decades including the most two dominant protocols BB84 and BB92.

            Content

            Author and article information

            Journal
            ScienceOpen Posters
            ScienceOpen
            24 November 2020
            Affiliations
            [1 ] Computer Science /Karunya Institute of Technology and Sciences/ Coimbatore, India
            Article
            10.14293/S2199-1006.1.SOR-.PPSDX4A.v1
            176eae07-4f94-449a-9a7a-d16128448a65

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            All data generated or analysed during this study are included in this published article (and its supplementary information files).

            Computer science

            Quantum cryptography , Cryptography

            Comments

            Comment on this article