Shedding Light on Quantum Cryptography
#1

Shedding Light on Quantum Cryptography

[attachment=16952]
Introduction
As data is stored on hard drives, flash drives, discs, and such it would be satisfying to have a
peace of mind that its integrity will maintain uncompromised. Data can become vulnerable to
devastation by hard drive failures or malfunctions in the electronics of the PC. It is for this
reason data backups are created, or arrays of disks for data retrieval is established by having it
spread out amongst other discs and create an index of where it all is stored. But while data
remains intact and appears to be safe from hardware failures, the need to protect it from prying
eyes or foreign systems has become a must. Several ideas in the form of intellectual property, or
system designs for a corporate airline are desired to be kept secure and away from those that
would benefit from their exposure.



Cryptography
Cryptography has a Greek foundation that is translated to mean ‘hidden’ or to be ‘secret’. As
mentioned above, hidden messages have existed for centuries, but modern day cryptography has
an assumed meaning to apply with computer systems and their storage or transmitting of data.
More specifically, cryptography involves the process and utilization of mathematics,
engineering, and computer science to turn ordinary data into an unreadable nonsense cluster of
data that only the intended recipient should be able to translate (Vittorio, 2002).



Quantum Mechanics
In order to understand quantum cryptography, a basic understanding of quantum mechanics
needs to be discussed. Quantum mechanics refers to the principles surrounding all physical
systems at the subatomic level. Amongst other objects, as it applies to the topic here, it describes
the characteristics of light waves, or photons, and the prediction of probabilities these particles
with undergo in application. The direction and movement of photons are better understood,
applying the theorem of quantum mechanics, and appear to be able to be regulated in such a way
that they are controlled (Wikipedia, 2009).



Cryptography Tribulations
The main function of cryptography is to hide messages (data) from the interceptor or
eavesdropper. In order to successfully decrypt a message that has been encrypted is by knowing
the method of encryption, cipher, and having the key for decrypting it. In the modern era of
encryption, the key is used in conjunction with the plaintext as an input to the algorithm that
encrypts the data, and in the same respect, decrypts it. These keys are essential to having the
decrypting solution and are considered sacred. As long as the key is secure, the encrypted text,
cryptogram, can be sent entirely across public networks without much worry. If it is intercepted,
the message cannot be deciphered without the key.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: quantum cryptography alice bob, quantum cryptography demo, quantum cryptography ieee base paper pdf, quantum cryptography lock, paper presentation on quantum cryptography for making code, seminar on quantum cryptography, seminar topic on quantum cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  power management using load shedding. seminar addict 2 1,971 13-03-2013, 02:44 PM
Last Post: computer idea
  HVDC LIGHT TECHNOLOGY seminar details 2 3,636 06-03-2013, 03:54 PM
Last Post: Guest
  AUTOMATIC ROOM LIGHT CONTROLLER WITH VISITOR COUNTER (IR SENSOR). seminar details 1 2,511 22-11-2012, 12:09 PM
Last Post: seminar details
  Quantum Cryptography full report seminar details 0 808 04-06-2012, 04:38 PM
Last Post: seminar details
  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols seminar paper 0 966 14-03-2012, 04:07 PM
Last Post: seminar paper
  Using Energy Conversations Technique Automatic Street light control By IC555 seminar paper 0 990 08-03-2012, 03:14 PM
Last Post: seminar paper
  Quantum Wells, Quantum Wire, and Quantum Dots seminar paper 0 1,026 07-03-2012, 03:26 PM
Last Post: seminar paper
  Cryptography ppt seminar paper 0 693 06-03-2012, 03:11 PM
Last Post: seminar paper
  MEEN 3344 Materials Light Emitting Polymers seminar addict 1 953 10-02-2012, 11:08 AM
Last Post: seminar addict
  Light-emitting polymers small details seminar addict 1 1,028 10-02-2012, 11:08 AM
Last Post: seminar addict

Forum Jump: