IJSRST1849128 | Received : 01 Dec 2015 | Accepted : 20 Dec 2015 | November-December 2015 [(1) 5 : 360-362] © 2015 IJSRST | Volume 1 | Issue 5 | Print ISSN : 2395-6011 | Online ISSN : 2395-602X Themed Section: Science and Technology 360 Brief Study of Quantum Cryptography Applications Bhavesh Prajapati Assistant Professor, IT Department, L. D. College of Engineering, Ahmedabad, India ABSTRACT Quantum cryptography is gaining importance among IT security practitioners day by day. Theory of quantum cryptography is quite sound and its practical implementations are also becoming mature day by day. With mature technology many applications can use quantum cryptography as back bone like secure key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet and many more. In this paper we are discussing possibilities of quantum cryptography applications. Keywords : Cryptography Applications, Quantum Cryptography Quantum Key Distribution Protocol, Quantum Internet, E-Governance, E-Commerce, Space Communication. I. INTRODUCTION Quantum information applications for cryptography are more than fifty years old. Wisner has proposed first ever application of quantum physics to quantum cryptography as quantum money and later oblivious transfer, a key concept of today's cryptography. Quantum theory is more mature than practical implementations. Shor's algorithm and Grover's algorithm have proved classical cryptography can be broken in few seconds as being based on mathematical problems and its computational security. In 1994, Shor proposed a quantum algorithm for integer factorization which reduces time spent on factorization to a great extent. RSA algorithm which previously taking nearly 13 months with latest computational power takes only 1 second to decrypt the encryption. In 1996, Grover came with algorithm which reduce the searching time from unsorted databases to a great extent. For a dataset of 1024 records, Grover's algorithm which uses quantum properties gives search result just in 32 comparisons. This advances threatens DES and AES security. Any information system is made secure with cryptographic applications and network security. Quantum cryptography is based on Heisenberg's uncertainty principle and no cloning theorem. Many practitioners are eyeing to quantum cryptography for future proof solutions. II. METHODS AND MATERIAL Quantum Key Distribution Quantum key distribution is also known as QKD in short. Quantum key distribution uses basic microscopic particles known as photon. Alice encodes these photons and then sent to Bob. Eve can intercept such particles over the channel but as per no cloning theorem she can not copy them or duplicate them. When we try to measure any quantum bit, it will change its state. So when Eve try to measure quantum bits, it will generate error in measurements at receiver side. Alice and Bob can calculate QBER- Quantum Bit