Seminartopics.in

IT Seminar Topics >> Quantum Cryptography
 

 

Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication. It is useful to assume that the communicating parties initially share a small amount of secret information, which is used up and then renewed in the exchange process, but even without this assumption exchanges are possible.The advantage of quantum cryptography over traditional key exchange methods is that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems. Even when assuming hypothetical eavesdroppers with unlimited computing power, the laws of physics guarantee (probabilistically) that the secret key exchange will be secure, given a few other assumptions.

Cryptography is the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology is the combination of the two. In the literature of cryptology, information to be encrypted is known as plaintext, and the parameters of the encryption function that transforms are collectively called a key. Existing cryptographic techniques are usually identified as ``traditional'' or ``modern.'' Traditional techniques date back for centuries, and are tied to the the operations of transposition (reordering of plaintext) and substitution (alteration of plaintext characters). Traditional techniques were designed to be simple, and if they were to be used with great secrecy extremely long keys would be needed. By contrast, modern techniques rely on convoluted algorithms or intractable problems to achieve assurances of security. There are two branches of modern cryptographic techniques: public-key encryption and secret-key encryption. In public-key cryptography, messages are exchanged using keys that depend on the assumed difficulty of certain mathematical problems -- typically the factoring of extremely large (100+ digits) prime numbers.

|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

You may also like this :

Hyper-Threading technology
InfiniBand
Infinite Dimensional Vector Space
Instant Messaging
Integrated Voice and Data
Intel Centrino Mobile Technology
Intelligent Software Agents
Internet Access via Cable TV Network
Internet Telephony Policy in INDIA
Introduction to the Internet Protocols
Inverse Multiplexing
IP spoofing
IP Telephony
Ipv6 - The Next Generation Protocol
Laptop Computer
Layer 3 Switching
M-Commerce
Migration From GSM Network To GPRS
Mobile IP
Mobile Virtual Reality Service
Modems and ISDN
Modular Computing
Motes
Multicast
Multiterabit Networks
Nanorobotics
Neural Networks And Their Applications
Optical Computer
Optical Fibre Cable
Optical Free Space Communication

 

 
<< Back to Topics Page
Copyright © 2012 www.seminartopics.in      Contact us: seminar990@gmail.com