Skip to main content

Quantum Cryptography

  • Chapter
  • First Online:
Quantum Technologies and Military Strategy
  • 471 Accesses

Abstract

Keeping secrets is a universal problem. Quantum technology promises to offer a solution to this problem. Data is all about facts and statistics. Many recognise data as a personal and secret entity. The quantitative data is available in form of numbers while text, images and videos make for qualitative data. Mostly various security mechanisms are put in pace for securing all kinds of data. In general, humans have been using various techniques to keep various secrets intact for centuries. This being a dynamic process, constantly efforts are getting made to upgrade and evolve new security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.britannica.com/topic/cipher, accessed on May 13, 2020.

  2. 2.

    WhatsApp, is an American freeware, owned by Facebook. It allows users to send text and voice messages, make video calls, and share images and documents.

  3. 3.

    Kessler [1].

  4. 4.

    https://www.tutorialspoint.com/cryptography/cryptography_quick_guide.htm, accessed on May 13, 2020.

  5. 5.

    Barker et al. [2].

  6. 6.

    A light-weight portable pin-and-lug cipher machine, developed at the beginning of World War II.

  7. 7.

    The Enigma machine is an encryption device (first half of 20th century) to protect commercial, diplomatic and military communication Nazi Germany had used it during World War II.

  8. 8.

    A Japanese “Type B Cipher Machine”, codenamed Purple by United States cryptanalysts.

  9. 9.

    https://www.iacr.org/, accessed on May 28, 2020.

  10. 10.

    Diffie and Hellman [3].

  11. 11.

    https://www.garykessler.net/library/crypto.html, accessed on May 18, 2020.

  12. 12.

    The Rivest-Shamir-Adleman (RSA) algorithm capitalizes on the fact that there is no efficient way to factor very large (100–200 digit) numbers. This algorithm gets used by modern computers to encrypt and decrypt messages.

  13. 13.

    https://www.elprocus.com/cryptography-and-its-concepts/, accessed on May 23, 2020.

  14. 14.

    The RSA algorithm is named after those who invented it in 1978: Ron Rivest, Adi Shamir, and Leonard Adleman.

  15. 15.

    https://www.educative.io/edpresso/what-is-the-rsa-algorithm, accessed on Feb 07, 2021.

  16. 16.

    https://www.misterpki.com/rsa-dsa-ecdsa/, accessed on Jun 05, 2020.

  17. 17.

    https://www.airtract.com/question/What-are-the-advantages-and-disadvantages-of-classical-cryptography, accessed on May 24, 2020.

  18. 18.

    https://searchsecurity.techtarget.com/definition/one-time-pad and http://users.telenet.be/d.rijmenants/en/onetimepad.htm, accessed on May 28, 2020.

  19. 19.

    https://link.springer.com/chapter/10.1007/0-387-26090-0_3, accessed on May 24, 2020.

  20. 20.

    https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/cryptography-fundamentals/breaking-cryptography-for-hackers/#gref, accessed on May 25, 2020.

  21. 21.

    https://www.computerworld.com/article/2550008/the-clock-is-ticking-for-encryption.html, accessed on May 25, 2020.

  22. 22.

    https://www.forbes.com/sites/waynerash/2019/10/31/quantum-computing-poses-an-existential-security-threat-but-not-today/#648870d95939, accessed on May 25, 2020.

  23. 23.

    Aditya and Shankar Rao [4].

  24. 24.

    http://abyss.uoregon.edu/~js/21st_century_science/lectures/lec14.html and https://www.geeksforgeeks.org/classical-cryptography-and-quantum-cryptography/, accessed May 24, 2020.

  25. 25.

    http://farside.ph.utexas.edu/teaching/qm/lectures/node5.html and https://www.geeksforgeeks.org/classical-cryptography-and-quantum-cryptography/, accessed May 24, 2020.

  26. 26.

    https://www.geeksforgeeks.org/classical-cryptography-and-quantum-cryptography/, accessed May 24, 2020.

  27. 27.

    https://quantumxc.com/quantum-cryptography-explained/, accessed on May 04, 2020. This reference has been consulted for the information discussed after note no. 22. At places the inputs presented as verbatim from the source consulted.

  28. 28.

    https://www.wired.com/insights/2014/09/quantum-key-distribution/, accessed on Jun 02, 2020.

  29. 29.

    Cardinal [5].

  30. 30.

    https://qt.eu/understand/underlying-principles/quantum-key-distribution-qkd/, accessed on June 02, 2020.

  31. 31.

    https://qt.eu/understand/underlying-principles/quantum-key-distribution-qkd/, accessed on June 02, 2020 and https://cordis.europa.eu/project/id/857156, accessed on Jun 03, 2020.

  32. 32.

    Korolov and Drinkwater [6].

  33. 33.

    Haitjem [7].

  34. 34.

    Mafu and Senekane [8].

  35. 35.

    Peng et al. [9].

  36. 36.

    https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun 05, 2020.

  37. 37.

    Is an asymmetric encryption algorithm (1978) by Robert McEliece. It use randomization in the encryption process. This not so popular encryption algorithm, is a candidate for “post-quantum cryptography”, since it is immune to attacks using Shor's algorithm.

  38. 38.

    Bernstein·et al. [10].

  39. 39.

    Bernstein and Lange [11].

  40. 40.

    Derek [12].

  41. 41.

    https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun 05, 2020.

  42. 42.

    https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun05, 2020.

  43. 43.

    Bernstein and Lange [13].

  44. 44.

    Fernández-Caramés and Fraga-Lamas [14].

References

  1. Kessler GC (2020) An overview of cryptography, 26 April 2020. https://www.garykessler.net/library/crypto.html. Accessed 13 May 2020

  2. Barker EB, Barker WC, Lee A (2005) Guideline for implementing cryptography in the federal government. NIST Spec Publ 800–21:4

    Google Scholar 

  3. Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. In: Proceedings of IEEE, vol 67, no 3, Mar 1979, pp 397–427

    Google Scholar 

  4. Aditya J, Shankar Rao P (2020) Quantum cryptography. https://cs.stanford.edu/people/adityaj/QuantumCryptography.pdf. Accessed 25 May 2020

  5. Cardinal D (2019) Quantum computing can soon help secure the power grid. https://www.extremetech.com/electronics/286893-quantum-computing-can-soon-help-secure-the-power-grid. Access 23 Dec 2019

  6. Korolov M and Drinkwater D (2020) What is quantum cryptography? It’s no silver bullet, but could improve security. https://www.csoonline.com/article/3235970/what-is-quantum-cryptography-it-s-no-silver-bullet-but-could-improve-security.html. Accessed 10 May 2020. Lattice cryptography is the favourite at present, simply because it’s the most practical to implement

  7. Haitjem M (2018) A survey of the prominent quantum key distribution protocols. https://www.cse.wustl.edu/~jain/cse571–07/ftp/quantum/#BB84. Accessed 04 Jun 2020 and Nurhadi AI, Syambas NR (2018) Quantum Key Distribution (QKD) protocols: a survey. In: 2018 4th international conference on wireless and telematics (ICWT), Nusa Dua, 2018, pp 1–5

  8. Mafu M, Senekane, M (2020) Security of quantum key distribution protocols, Chapter 1, p 6. https://www.intechopen.com/books/advanced-technologies-of-quantum-key-distribution/security-of-quantum-key-distribution-protocols. Accessed 04 May 2020

  9. Peng Q, Xiaodong W, Guo Y (2019) Improving eight-state continuous variable quantum key distribution by applying photon subtraction. Appl Sci 9(1333):1–9

    Google Scholar 

  10. Bernstein D, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer, Heidelberg, p 11

    Google Scholar 

  11. Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549:188

    Google Scholar 

  12. Rice D (2020) Quantum cryptography and post-quantum cryptography? https://fedtechmagazine.com/article/2020/03/what-difference-between-quantum-cryptography-and-post-quantum-cryptography-perfcon. Accessed 04 June 2020

  13. Bernstein D, Lange T (2017) Post-quantum cryptography. Nature 549:188–194

    Article  Google Scholar 

  14. Fernández-Caramés TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lele, A. (2021). Quantum Cryptography. In: Quantum Technologies and Military Strategy. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72721-5_4

Download citation

Publish with us

Policies and ethics