The uses of computer communications networks technologies have increased the incidents of computer abuse. Due to these incidents, most organizations are facing pressure to protect their assets.
For this reason extensive efforts have been made to establish new foundation for cryptographic science in the world of computer communications networks. One of these efforts has led to the development of quantum cryptographic technology, whose transmissions security relies on the inviolability of the laws of quantum mechanics.
Quantum cryptography is seen as an emerging technology in which two parties can securely communicate over a communication network applying the phenomena of quantum physics.
This essay focuses on the fundamental of quantum cryptography and it’s the future direction.
Introduction
Cryptography plays a vital role in today’s computer and communications networks, protecting everything from business e-mails, bank transactions and Internet shopping. In recent years, hackers have demonstrated increased technical knowledge, in developing new alternatives to exploit network vulnerabilities, and create advanced software tools to automate attacks.
Today with the exponential growth of computer technology the primary concern is that many attacks involve unauthorized secret access to information resources, and corporate businesses are often unaware of these unauthorized accesses to their data. As computing power increases, and new classical computational techniques are developed, the length of time that a message can be considered secure will decrease, and numerical keys will no longer be able to provide acceptable levels of secure communications.
For this reason, for the past decades efforts have been made to establish n...
... middle of paper ...
...e seen when applied to communication between two people in different location, provided the communication is quantum. A quantum message that is intercepted and read by an eavesdropper will become garbled and useless.
The effect produced by measuring a quantum property is irreversible, which means an eavesdropper cannot revert a quantum message to its original state.
These properties provide the power of quantum cryptography. No amount of effort or genius can alter the fact that observing a quantum property irrevocably alters the object being observed. It is as if you were to mail a document to a friend or a relative and someone in the post office opens the package and reads the document and all of the letters become scrambled and the document is rendered unreadable. Furthermore the document cannot be reverted back to its original state.
Today’s encryption methods employ the factoring of extremely large numbers. Nevertheless, several quantum algorithms already exist that can factor large numbers almost instantaneously. Although quantum computing is still in its infancy, numerous national defense experts have argued that innovative systems of encryption will become increasingly critical as quantum computing progresses. In an effort to augment the future of national security, I aspire to develop groundbreaking encryption techniques that will defend against many impending
...hes. In Alice and Quantumland, the principles or concepts of quantum mechanics are compared with the macro world; one can find great similarities and even greater dissimilarities between the world wherein electrons rule, and the world wherein human beings live. The author, Robert Gilmore, creates an allegory based off the principles of quantum mechanics using the original story of Alice in Wonderland. Through Alice’s adventure in Quantumland she comes across some ideas or features that contradict real world ideas. These ideas are the following: Electrons have no distinguishing spin, the Pauli Exclusion Principle, Superposition, Heisenberg Uncertainty Principle, and . All of these features are comprised essentially of the same universal concept--that the quantum world does not require definity whereas the macro world uses it as a pillar of society and civilization.
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
Quantum mechanics describes several objects and phenomena that seem strange and are difficult to understand. Among these are quanta “chunks” of energy; the wave-particle duality of matter; and the uncertainty principle which limits what we can know about objects. In 1927, German physicist Werner Heisenberg discovered a general characteristic of quantum mechanics, the uncertainty principle. According to this principle, it is impossible to precisely describe both the location and the momentum of a particle at the same time, therefore it affects the attempts to measure a particle’s location and
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Schrödinger, Erwin. "The Present Situation in Quantum Mechanics." Proceedings of the American Philosophical Society (1983): 323-38.
The discovery that we can make photons act strongly together could make developing quantum computers a lot easier. this discovery is the most recent of the five having only happened last year. Normally photons don't interact “Getting photons to stick together is not easy because they normally pass through each other without interacting”(Johnson), but...
In the final analysis, quantum specimens both conceptual, entity, and particles are what sustain human life. Without some time of mystery and amusement humans would never seek to make innovations. Without innovations society would begin to stagnate into a pig sty of rituals. If one society were to collapse, then others would soon follow. This collapse of society is the true Armageddon, the failure of all supernatural quanta to act with normal quanta. Hence the important of quantum physics, it is necessary for life, society, and humanity.
One of the largest parts of commerce is transaction. Transactions are needed anytime two parties exchange money or information. Since the Information Age has begun, transactions are more common over the Internet, where it is more imperative that transactions are secure (Klein x). Corporations have also become more widespread, which means that cryptography is needed to secu...
Quantum computing will not solve the current issue because no one knows yet how long a true Quantum computer will take to develop or how many functions it will accurately perform early o...
Enter the telltale ‘but.’ Wheeler seems troubled more by why quanta exist than how to define the quantum as a working concept in physics. He says, in fact, that “not knowing ‘how come’” the quantum shames “the glory of [its] achievements” in science (41-42).
Computers; they are a part of or in millions of homes; they are an intricate part of just about every if not all successful businesses, the government, and the military. Computers have become common place in today’s society and the lives of the people who live in it. They have crossed every national, racial, cultural, educational, and financial barrier, which consequently ushered in the information age. A computer is a programmable electronic device that can store, retrieve and process data, and they come in all shapes, and sizes. They can be used for and in just about anything. As stated before, they are used in just about every aspect of modern society. They are so fundamental to modern society that it would be disastrous to society without them. As stated before, there are many areas in modern society that are run by computers. They play an intricate part of millions of homes in the world. Office workers in business, government and the military may use them to write letters, keep rosters, create budgets, find information, manage projects, communicate with workers, and so on. They are used in education, medicine, music, law enforcement, and unfortunately crime. Because computers have become such a part of the world and how it operates, there is a tremendous responsibility for those who are in control of these computers and the vital information that they carry, to manage and protect them properly. This is management and protection is vital because any loss or damage could be disastrous for the affected entity. For example, a mistake or intentional alteration of a personal credit file could affect ones ability to buy a car or home, or can lead to legal actions against the affected person until the mistake or intentional alteration has been corrected. Therefore, with the advent of computers in the information age, and all of the intentional and unintentional violations against them, comes the need to safeguard them and the information they carry with strong systems and policies of computer security.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Quantum mechanics has been around for at least a century and for about half of those years it has been widely rejected. When scientist finally saw its potential, they opened up to the idea and started creating many new experiments and finding out the great answers to the biggest questions in life. Scientists will continue to make amazing advancements in quantum mechanics and may be able to one day figure out a way to improve our lives with some of the greatest technology that mankind has ever seen.
The internet offers high speed connectivity between countries, which allows criminals to commit cybercrimes from anywhere in the world. Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). This lack of security enables hacker...