Quantum and Traditional Cryptography: Techniques Comparison

Verified

Added on  2022/10/17

|5
|939
|8
Discussion Board Post
AI Summary
This discussion post examines the security of cryptography based on quantum mechanics, comparing it to traditional methods. The assignment addresses the design of cryptographic techniques, specifically quantum key exchange and encryption schemes, in the context of future large-scale quantum computers. It emphasizes the advantages of quantum cryptography, which utilizes the laws of physics to enhance security, particularly in the face of potential vulnerabilities in traditional cryptography. The post highlights the importance of quantum key distribution (QKD) and the potential for quantum cryptography to address rising concerns about cybercrime and data security. It also explores the limitations of traditional encryption, which can be broken, and the benefits of quantum cryptography, which makes it difficult for third parties to intercept data. The discussion also highlights the growing utilization of quantum cryptography in digital currency and payment systems.
Document Page
Running Head: QUANTUM AND TRADITIONAL CRYPTOGRAPHY 1
Quantum and Traditional Cryptography
Name
Institution
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
QUANTUM AND TRADITIONAL CRYPTOGRAPHY 2
Quantum cryptography is a kind of messages encryption system that is utilized in
transmitting the mystery key for unscrambling over separation. This kind of information
encryption is viewed as progressively secure given that it utilized rule that depend on material
science laws (Gottesman, 2011). It is picking from where the present specialized techniques
utilizing mystery keys flopped as they this present strategy depends on numerical suppositions
which are problematic. Given that the innovation is at its pinnacle and as time passes there are
more creations in innovation, utilization of quantum cryptography will help in tending to the
security issues. ("Acknowledgement to Reviewers of Cryptography in 2017", 2018)The ascent in
the utilization of digital currency will be fitting for the instances of security since with the
development and utilization of quantum cryptography, there will be less instances of taken
information.
The fate of security is at the stake of cryptography and as the conventional cryptography
continues being misused, at that point the future innovations will be tended to utilizing quantum
cryptography. The war on cybercrime has likewise been raised however the culprits are as yet
getting more astute which means development of quantum cryptography and its related
innovations will debilitate the exercises of programmers (Buchmann, Braun, Demirel and Geihs,
2017). The sharing of data over the globe keeps on ascending as the innovation continue
transforming the globe into a town. Having secure methods and channel of sharing these data
implies the clients will be additionally ready to share data. The block chain business just as
installment frameworks, for example, PayPal will continue improving and developing since their
exercises will be more verified by the quantum cryptography.
Document Page
QUANTUM AND TRADITIONAL CRYPTOGRAPHY 3
Quantum cryptography is the best system of
information encryption in that it is outlandish
for the outsider to take the data that is being
shared between the imparting parties. This
makes the key difficult to split
Conventional encryption has the danger of
being undermined in future through breaking
of its encryption system making its
encryptions and transmissions retroactively.
For quantum cryptography, the issue in
conventional cryptography is tended to by
utilizing quantum key dissemination. In this
method, the exceptional key transmission is
finished utilizing light (photons) where the
sender has unique gadgets to be utilized
which are single-photon locator and single-
photon source (Buchmann, Braun, Demirel
and Geihs, 2017).
For conventional cryptography, sender sends
the way in to the beneficiary which is then
decoded for one to get the data. Since the key
is sent through open channel, and the reality a
similar data is send through a similar channel,
the outsider will in this manner need to tune
in to the channel utilized or capture it and get
the key.
It is anything but difficult to identify that the
key has been taken or meddled with in
Quantum mechanics since upon block attempt
by the outsider, the molecule state will
crumple thus provoking the important
gatherings required to change the unique key
For the instance of customary cryptography, it
is anything but difficult to block and alter the
key as it is anything but difficult to break it.
(Kim, 2016)This is on the grounds that there
will be no sign that the key has been caught
since the correspondence will at present be
Document Page
QUANTUM AND TRADITIONAL CRYPTOGRAPHY 4
being shared. proceeding regularly.
Quantum Key Distribution (QKD) can be
characterized as the quantum cryptography
subset which was created so as to be utilized
in moving symmetric encryption keys shared
by two ordained areas.
Conventional cryptography specialized
techniques utilizing mystery keys flopped as
they this present strategy depends on
numerical suppositions which are doubtful
So as to ensure and verify interchanges,
Quantum Key Distribution utilizes quantum
mechanics as this method enables two
gatherings to share the irregular mystery key.
The mystery key is utilized for encoding and
unscrambling messages. The structure
hypothesis on this information is that a qubit
(quantum unit) which is a quantum of data is
simple and takes into consideration old style
bits taken as estimations of 0 or 1. (Chung,
Georgiou, Lai & Zikas, 2019)
For the instance of customary cryptography,
the key can be taken and the programmers
adjust or simply snoop on the messages being
shared.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
QUANTUM AND TRADITIONAL CRYPTOGRAPHY 5
References
Buchmann, J., Braun, J., Demirel, D., & Geihs, M. (2017). Quantum cryptography: a view from
classical cryptography. Quantum Science And Technology, 2(2), 020502. doi:
10.1088/2058-9565/aa69cd
Gottesman, D. (2011). Quantum Cryptography: A Tale of Secrets Revealed Through the Laws of
Physics [Video]. Retrieved from https://youtu.be/NejFo5hKcOg
Kim, K. (2016). Cryptography: A New Open Access Journal. Cryptography, 1(1), 1. doi:
10.3390/cryptography1010001
Acknowledgement to Reviewers of Cryptography in 2017. (2018). Cryptography, 2(1), 2. doi:
10.3390/cryptography2010002
Chung, K., Georgiou, M., Lai, C., & Zikas, V. (2019). Cryptography with Disposable Backdoors.
Cryptography, 3(3), 22. doi: 10.3390/cryptography3030022
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]