Limitations of Practical Quantum Cryptography
Citation
Vibha Ojha, Anand Sharma, Vishal Goar, Prakriti Trivedi. "Limitations of Practical Quantum Cryptography"International Journal of Computer Trends and Technology (IJCTT),V1(1):90-93 March to April Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract—As we all know that the quantum cryptography is having lots of consideration in present time for security but it’s important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using Quantum Key Distribution (QKD). Distribution of keys is just a part of securing information. Proper encryption and decryption are equally important for preventing Eve from guessing the key. But even QKD has a lot to overcome before it’s perfectly safe and practically useful. In this paper we are describing the various limitations of quantum cryptography along with its many real time implementation problems.
References-
[1] W. K.Wooters and W. H. Zurek, “A single quantum cannot be cloned,” Nature, vol. 299, pp. 802–803, 1982.
[2] J. F. Clauser, “Experimental distinction between the quantum and classical field-theoretic predictions for the photoelectric effect,” Phys. Rev. D, Part. Fields, vol. 9, pp. 853–860, 1974.
[3] R. J. Hughes, J. E. Nordholt, D. Derkacs, and C. G. Peterson, “Practical free-space quantum key distribution over 10 km in daylight and at night,”New Journal of Physics, vol. 4, pp. 43.1– 43.14, 2002 Eric Weisstein`s World of Science on Birefringence http://scienceworld.wolfram.com/physics/Birefringe nce.html
[4] Kartalopoulos, S. V. “Identifying vulnerabilities of quantum cryptography in secure optical data transport” milcom 2005, vol 5, pp. 2788-2796
Keywords—- QC; QKD; BB84; limitations