Research Article | Open Access | Download PDF
Volume 1 | Issue 1 | Year 2011 | Article Id. IJCTT-V1I1P22 | DOI : https://doi.org/10.14445/22312803/IJCTT-V1I1P22
Limitations of Practical Quantum Cryptography
Vibha Ojha, Anand Sharma, Vishal Goar, Prakriti Trivedi
Citation :
Vibha Ojha, Anand Sharma, Vishal Goar, Prakriti Trivedi, "Limitations of Practical Quantum Cryptography," International Journal of Computer Trends and Technology (IJCTT), vol. 1, no. 1, pp. 90-93, 2011. Crossref, https://doi.org/10.14445/22312803/IJCTT-V1I1P22
Abstract
As we all know that the quantum cryptography is having lots of consideration in present time for security but it’s important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using Quantum Key Distribution (QKD). Distribution of keys is just a part of securing information. Proper encryption and decryption are equally important for preventing Eve from guessing the key. But even QKD has a lot to overcome before it’s perfectly safe and practically useful. In this paper we are describing the various limitations of quantum cryptography along with its many real time implementation problems.
Keywords
QC; QKD; BB84; limitations
References
[1] W. K.Wooters and W. H. Zurek, “A single quantum cannot be cloned,” Nature, vol. 299, pp. 802–803, 1982.
[2] J. F. Clauser, “Experimental distinction between the quantum and classical field-theoretic predictions for the photoelectric effect,” Phys. Rev. D, Part. Fields, vol. 9, pp. 853–860, 1974.
[3] R. J. Hughes, J. E. Nordholt, D. Derkacs, and C. G. Peterson, “Practical free-space quantum key distribution over 10 km in daylight and at night,”New Journal of Physics, vol. 4, pp. 43.1– 43.14, 2002 Eric Weisstein`s World of Science on Birefringence http://scienceworld.wolfram.com/physics/Birefringe nce.html
[4] Kartalopoulos, S. V. “Identifying vulnerabilities of quantum cryptography in secure optical data transport” milcom 2005, vol 5, pp. 2788-2796.
[5] Centre for Pervasive Healthcare. http://www.pervasivehealthcare.dk/.
[6] Java Cryptography Extension. http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/JCERefGuide.ht ml.
[7] A. Milenkovic, C. Otto, and E. Jovanov. Wireless sensor networks for personal health monitoring: Issues and an implementation Computer Communications (Special issue: Wireless sensor networks for personal health monitoring: Issues and an implementation Computer Communications (Special issue: Wireless ISSN:2231-2803 Sensor Networks: Performance, Reliability, Security, and Beyond), Elsevier, 29(13-14):2521-2533, Oct 2006.
[8] S. K. S. Gupta, S. Lalwani, Y. Prakash, E. Elsharawy, and L. Schwiebert. Towards a propagation model for wireless biomedical applications. IEEE International Conference on Communications (ICC), 3:1993-1997, May 2003.
[9] D. M. Fraser. Biosensors: Making sense of them. Medical Device Technology, 5(8):38-41, Feb 1994.
[10] S. K. S. Gupta, S. Lalwani, Y. Prakash, E. Elsharawy, and L. Schwiebert. Towards a propagation model for wireless biomedical applications. IEEE International Conference on Communications (ICC), 3:1993-1997, May 2003.