Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
16 views5 pages

Session 5 Assignment RIT

assignment 5

Uploaded by

yejix74473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views5 pages

Session 5 Assignment RIT

assignment 5

Uploaded by

yejix74473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1

Quantum Cryptography: Secure Communication in the Quantum Era

Najam Uddin Awais Mohammed


ITM 510 Research in Information Technology
#517
Concordia University St Paul
Chris Meehleib
06/09/2024
2

Quantum cryptography: Secure communication in the quantum era

Introduction

The introduction will start by presenting an overview of Quantum Cryptography and

how it is ideal for enhancing communication security. The introduction will highlight the

limitations existing in classical cryptographics and explain why it is important to implement

more sophisticated security solutions. The principles of quantum mechanics and their

relationship to cryptography and entanglement will be presented. Furthermore, the

introduction will also present the objectives of the research. A thesis statement will be

provided indicating the importance of undertaking the research.

Problem Statement

The problem statement will outline some challenges traditional cryptographic systems

face in responding to quantum computing threats. The problem statement will present why

current encryption methods have failed in protecting crucial data in the age of constantly

evolving technology. The need for more future-proof security methods will be presented in

relation to how Quantum Cryptography can provide reliable protection. Furthermore, the

issues emerging in implementing these systems, such as cost implications, will also be

outlined.

Background

The background of the study will describe how Quantum Cryptography has evolved

over the years and transitioned from traditional techniques to more advanced, reliable

techniques. The critical concepts of Quantum mechanics, such as superposition, will be

presented, which are the backbone for Quantum cryptography. Quantum key distribution

(QKD0 protocols) and their impact on the future of secure communication will also be

mentioned.
3

Purpose

The purpose of the study will be to present how quantum cryptographic techniques

are effective in enhancing communication security. The research will determine how QKD

protocols are instrumental and their merits compared to classical methods. The study will

analyze previous literature and experiments on the subject to assess how QC can be

incorporated into pre-existing systems to protect against cyber threats.

Significance

The research significance will further emphasize why improving cryptographic

methods to deal with current system vulnerabilities against computing threats is crucial. This

section will also indicate how QC will help evolve data security with unbreakable encryption.

Furthermore, this section will highlight how various industries can benefit from this secure

communication.

Methods

The methodology section will include a comprehensive secondary literature review. It

will indicate how suitable scholarly articles were identified for this paper. The criteria for

selecting suitable sources will be presented. This will also include the analytical framework

incorporated for comparison and bridging research gaps.

Literature Review

The literature review will include an exploration of relevant academic databases such

as Google Scholar, Emerald Insight, IEEE, and ScienceDirect. Keywords such as quantum

cryptography, quantum key distribution, and secure communication will be used to obtain the

relevant content. The obtained literature will be discussed based on credibility and then

grouped based on theoretical frameworks. A comparative analysis will then be conducted


4

against classical cryptography methods. This will bridge research gaps and propel future

research.

Hypothesis

This will include a testable prediction that has been obtained from gaps in existing

research. A sample hypothesis would be that QKD protocols give higher security levels than

traditional cryptographic techniques.

Definition of Terms

Technical terms will be defined along with unknown abbreviations.

Research Assumptions

Research assumptions will include the notion that QC principles are reliable and

credible. Other assumptions will be based on the scalability of QKD protocols and their

integration into current communication infrastructures. These assumptions will help guide

how the results are interpreted.

Scope And Limitations

The scope of the study will create a clear boundary of the specific things the research

will cover, such as QC principles, challenges in implementation, and comparative analysis

with pre-existing cryptographic methods. It also presents the application of QKD protocols to

real-life industries.

Explain the procedure

The procedure will incorporate several steps:

 A comprehensive literature review

 Analysis of previous experiments on the reliability of QKD protocols.


5

 Collecting data on crucial metrics such as security levels and error rates.

 Analysis of the results obtained on the scalability of QKD protocols.

 Presentations of findings and implications for future research on secure

communication.

You might also like