Full Paper View


Quantum Cryptography: The Future of Internet and Security Management

Faisal Abbasi, Pawan Singh
Research Paper | Journal Paper
Volume 1 , Issue 1 , PP 1-12


In today’s world, cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be “Inevitable to Track”. But living in an era where nothing is impossible to achieve, so cryptographic techniques are exposed to both technologies’ advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.

Key-Words / Index Term

Quantum, Cryptography, Intractable, Confidentiality


[1] Bennett, C. H., & Brassard, G. (1987). Quantum public key distribution reinvented. ACM SIGACT News, 18(4), 51-53. [2] Bennett, C. H., Brassard, G., & Ekert, A. K. (1992). Quantum cryptography. Scientific American, 267(4), 50-57. [3] Bennett, C. H., & DiVincenzo, D. P. (2000). Quantum information and computation. nature, 404(6775), 247-255. [4] Bennett, C. H., & Shor, P. W. (1998). Quantum information theory. IEEE transactions on information theory, 44(6), 2724-2742. [5] Brassard, G., & Crépeau, C. (1996). 25 years of quantum cryptography. ACM Sigact News, 27(3), 13-24. [6] Gottesman, D., & Lo, H. K. (2001). From quantum cheating to quantum security. arXiv preprint quant-ph/0111100. [7] Lo, H. K. (1998). Quantum cryptology. In Introduction to quantum computation and information (pp. 76-119). [8] Khan, M., & Shah, T. (2014). A construction of novel chaos-based nonlinear component of a block cypher. Nonlinear Dynamics, 76(1), 377-382. [9] Stallings, W. (1999). Secure hash algorithm. Cryptography and Network Security: Principles and Practice, 193-197. [10] Wiesner, S. (1983). Conjugate coding. ACM Sigact News, 15(1), 78-88. [11] Bennett, C. H., & Brassard, G. (1984). Proceedings of the ieee international conference on computers, systems and signal processing. [12] Campbell, A. Quantum Key Distribution as a Next-Generation Cryptographic Protocol. [13] Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802-803.
[14] D. Enzer, P. Hadley, R. Hughes, C. Peterson and P. Kwiat, “Entangled-photon six-state quantum cryptography,” New J. Phys. 4 (July 2002) 45
[15] N. Gisin et al, “Quantum cryptography,” Rev. Mod. Phys., Vol. 74, No. 1, January 2002. [18] C. Elliott, “Building the quantum network,” New J. Phys. 4 (July 2002) 46.
[16] G. Brassard and L. Salvail, “Secret key reconciliation by public discussion,” Lect. Notes in Computer Science 765, 410. (1994).
[17] M. Wegman and L. Carter, “New Hash Functions and their Use in Authentication and Set Equality,” J. Comp. Sys. Sci., 22, 265-279 (1981).
[18] B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, “Defense frontier analysis of quantum cryptographic systems,” Applied Optics, vol. 37, no. 14, 1998, pp. 2869 – 2878.