Network Security Using Quantum Cryptography
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - April Issue 2013 by IJCTT Journal|
|Volume-4 Issue-4 |
|Year of Publication : 2013|
|Authors : N.Kusuma, N.Sai Tejaswi, T.Anitha, K.V.D Kiran|
N.Kusuma, N.Sai Tejaswi, T.Anitha, K.V.D Kiran "Network Security Using Quantum Cryptography "International Journal of Computer Trends and Technology (IJCTT),V4(4):791-795 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: -Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical and versatile techniques available. Fiat-Shamir signature schemes, DSA and related signature schemes are two other methods reviewed. Digital signatures have many applications in information security, including authentication, data integrity, and non-repudiation was reviewed. Owing to the drawbacks of basic Cryptographic Systems, our focus turned towards Quantum Cryptography whose strength, secrecy and privacy lies in the Laws of Physics than current state of unproven mathematical assumptions in Classical Cryptography.
 Adleman, L., Rivest, R., Shamir, A 1978., “A method for obtaining digital signatures and public key cryptosystems”, Communications of the Association for Computing Machinery.
 Bennett, C. H.1992, “Quantum cryptography using any two non orthogonal states”, Physical Review Letters, 68, (21), 3121–3124.
 Bennett, C. H., Brassard. G. 1984, “Quantum cryptography: public key distribution and coin tossing”, Proceedings IEEE international conference on computers, systems, and signal processing.
 Bennett, C. H., Brassard, G., Crepeau, C., Maurer, U. M. 1995, “Generalized privacy amplification”, IEEE Transactions on Information Theory.
 Breyta, G., Chuang, I. L., Sherwood, M. H., Steffen, M., Vandersypen, L. M. K., Yannoni, S. 2001, “Experimental realization of Shor`s quantum factoring algorithm using nuclear magnetic resonance”, Nature, 414.
 Burnette, E. 2007, “D-Wave demonstrates latest quantum computer prototype at SC07”, http://blogs.zdnet.com/Burnette/?p=456.
 Choi, K. S., Chou, C. W., Deng, H., Felinto, D., Kimble, H. J., Laurat, J.,Riedmatten, H. 2007, ‘Functional quantum nodes for entanglement distribution over scalable quantum networks”
Keywords — Network security, Quantum cryptography, photon polarization, distribution, polarization filter