Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views4 pages

Session 2.2 Assignment

Uploaded by

yejix74473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Session 2.2 Assignment

Uploaded by

yejix74473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1

Quantum cryptography: Secure communication in the quantum era


Najam Uddin Awais Mohammed
ITM 510 Research in Information Technology
#517
Concordia University St Paul
Chris Meehleib
05/19/2024
2

Quantum cryptography: Secure communication in the quantum era

Cryptography was initially formulated in 1988 to have knowledge security aligned

with the properties of quantum physics. According to Muruganantham et al. (2020), quantum

cryptography possesses a non-cloning attribute that frustrates attackers when attempting to

alter the quantum states before being transmitted to the recipient. This mechanism operates

following the opposite movement of the position of a photon that impacts all consecutive

measures. This ensures that there is no unauthorized access to the quantum key and makes it

difficult to duplicate the unknown qubits. Quantum cryptography relies on the Heisenberg

uncertainty and can transmit data without affecting the system. The non-cloning aspect of this

phenomenon prohibits duplication of photons without accessing the word. The schematics of

quantum cryptography allow for the transmission of unknown quantum news far from light

quantum.

Research Question

How do quantum communication networks alter from traditional networks in scalability,

architecture, and protocols?

Significance

This topic particularly intrigues me due to some of the algorithms used such as Shor`s

and Grover`s algorithms. Shor`s algorithm involves a quantum computer that has changed the

basics of large integers hence indicating that asymmetric cryptography is collapsed through

collapsing of substantial prime numbers (Muruganantham et al., 2020). Quantum Key

Distribution (QKD) and Quantum Cryptography (QC) are two cryptographic methods that

incorporate quantum mechanical systems to generate and distribute cryptographic keying

material. QKD and QC use physics principles and technology to pass messages via a

dedicated communications link. This topic also interests me because quantum-resistant


3

algorithms can be implemented on existing platforms to extract security through

mathematical complexity (NSA, 2024).

The BB84 QKD protocol is also made of rectilinear and diagonal basis and four

polarized photon states. According to Padmavathi et al. (2018) we determine that the bits are

encoded into qubits using photon polarization. For the secret key's successful distribution,

two communication channels should exist between the sender and receiver (classical channel

+ quantum channel). The sender prepares qubits by choosing random bits and representing

them with the use of corresponding random bias. The receiver then measures each of the

received qubits with either rectilinear or diagonal bases.


4

References

Muruganantham, B., Shamili, P., Kumar, S. G., & Murugan, A. (2020). Quantum

cryptography for secured communication networks. International Journal of

Electrical and Computer Engineering (IJECE), 10(1), 407.

https://doi.org/10.11591/ijece.v10i1.pp407-414

NSA. (2024). National Security Agency/Central Security Service > Cybersecurity >

Quantum Key Distribution (QKD) and Quantum Cryptography QC. Www.nsa.gov.

https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-

Cryptography-QC/

Padmavathi, V., Vardhan, Bulusu Vishnu, & Krishna, A. V. (2018). Significance of crucial

distribution using quantum cryptography. International Journal of Innovative

Computing, Information and Control, 14(1), 371–377.

You might also like