Quantum Cryptography: A New Generation of Information Technology Security System
- 1 January 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1644-1648
- https://doi.org/10.1109/itng.2009.173
Abstract
Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote "Conjugate Coding", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.Keywords
This publication has 17 references indexed in Scilit:
- Quantum cryptographyACM Computing Surveys, 2007
- Key to the quantum industryPhysics World, 2007
- An introduction to quantum cryptographyXRDS: Crossroads, The ACM Magazine for Students, 2005
- Quantum cryptography in practicePublished by Association for Computing Machinery (ACM) ,2003
- Some facets of complexity theory and cryptographyACM Computing Surveys, 2002
- Building the quantum network*New Journal of Physics, 2002
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Conjugate codingACM SIGACT News, 1983
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949