IJSRST1849128 | Received : 01 Dec 2015 | Accepted : 20 Dec 2015 | November-December 2015 [(1) 5 : 360-362]
© 2015 IJSRST | Volume 1 | Issue 5 | Print ISSN : 2395-6011 | Online ISSN : 2395-602X
Themed Section: Science and Technology
360
Brief Study of Quantum Cryptography Applications
Bhavesh Prajapati
Assistant Professor, IT Department, L. D. College of Engineering, Ahmedabad, India
ABSTRACT
Quantum cryptography is gaining importance among IT security practitioners day by day. Theory of quantum
cryptography is quite sound and its practical implementations are also becoming mature day by day. With
mature technology many applications can use quantum cryptography as back bone like secure key distribution,
secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet and
many more. In this paper we are discussing possibilities of quantum cryptography applications.
Keywords : Cryptography Applications, Quantum Cryptography Quantum Key Distribution Protocol, Quantum
Internet, E-Governance, E-Commerce, Space Communication.
I. INTRODUCTION
Quantum information applications for cryptography
are more than fifty years old. Wisner has proposed
first ever application of quantum physics to quantum
cryptography as quantum money and later oblivious
transfer, a key concept of today's cryptography.
Quantum theory is more mature than practical
implementations. Shor's algorithm and Grover's
algorithm have proved classical cryptography can be
broken in few seconds as being based on mathematical
problems and its computational security. In 1994,
Shor proposed a quantum algorithm for integer
factorization which reduces time spent on
factorization to a great extent. RSA algorithm which
previously taking nearly 13 months with latest
computational power takes only 1 second to decrypt
the encryption.
In 1996, Grover came with algorithm which reduce
the searching time from unsorted databases to a great
extent. For a dataset of 1024 records, Grover's
algorithm which uses quantum properties gives search
result just in 32 comparisons. This advances threatens
DES and AES security.
Any information system is made secure with
cryptographic applications and network security.
Quantum cryptography is based on Heisenberg's
uncertainty principle and no cloning theorem. Many
practitioners are eyeing to quantum cryptography for
future proof solutions.
II. METHODS AND MATERIAL
Quantum Key Distribution
Quantum key distribution is also known as QKD in
short. Quantum key distribution uses basic
microscopic particles known as photon. Alice encodes
these photons and then sent to Bob. Eve can intercept
such particles over the channel but as per no cloning
theorem she can not copy them or duplicate them.
When we try to measure any quantum bit, it will
change its state. So when Eve try to measure quantum
bits, it will generate error in measurements at receiver
side. Alice and Bob can calculate QBER- Quantum Bit