Abstract
Keeping secrets is a universal problem. Quantum technology promises to offer a solution to this problem. Data is all about facts and statistics. Many recognise data as a personal and secret entity. The quantitative data is available in form of numbers while text, images and videos make for qualitative data. Mostly various security mechanisms are put in pace for securing all kinds of data. In general, humans have been using various techniques to keep various secrets intact for centuries. This being a dynamic process, constantly efforts are getting made to upgrade and evolve new security mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
https://www.britannica.com/topic/cipher, accessed on May 13, 2020.
- 2.
WhatsApp, is an American freeware, owned by Facebook. It allows users to send text and voice messages, make video calls, and share images and documents.
- 3.
Kessler [1].
- 4.
https://www.tutorialspoint.com/cryptography/cryptography_quick_guide.htm, accessed on May 13, 2020.
- 5.
Barker et al. [2].
- 6.
A light-weight portable pin-and-lug cipher machine, developed at the beginning of World War II.
- 7.
The Enigma machine is an encryption device (first half of 20th century) to protect commercial, diplomatic and military communication Nazi Germany had used it during World War II.
- 8.
A Japanese “Type B Cipher Machine”, codenamed Purple by United States cryptanalysts.
- 9.
https://www.iacr.org/, accessed on May 28, 2020.
- 10.
Diffie and Hellman [3].
- 11.
https://www.garykessler.net/library/crypto.html, accessed on May 18, 2020.
- 12.
The Rivest-Shamir-Adleman (RSA) algorithm capitalizes on the fact that there is no efficient way to factor very large (100–200 digit) numbers. This algorithm gets used by modern computers to encrypt and decrypt messages.
- 13.
https://www.elprocus.com/cryptography-and-its-concepts/, accessed on May 23, 2020.
- 14.
The RSA algorithm is named after those who invented it in 1978: Ron Rivest, Adi Shamir, and Leonard Adleman.
- 15.
https://www.educative.io/edpresso/what-is-the-rsa-algorithm, accessed on Feb 07, 2021.
- 16.
https://www.misterpki.com/rsa-dsa-ecdsa/, accessed on Jun 05, 2020.
- 17.
https://www.airtract.com/question/What-are-the-advantages-and-disadvantages-of-classical-cryptography, accessed on May 24, 2020.
- 18.
https://searchsecurity.techtarget.com/definition/one-time-pad and http://users.telenet.be/d.rijmenants/en/onetimepad.htm, accessed on May 28, 2020.
- 19.
https://link.springer.com/chapter/10.1007/0-387-26090-0_3, accessed on May 24, 2020.
- 20.
- 21.
https://www.computerworld.com/article/2550008/the-clock-is-ticking-for-encryption.html, accessed on May 25, 2020.
- 22.
- 23.
Aditya and Shankar Rao [4].
- 24.
- 25.
- 26.
https://www.geeksforgeeks.org/classical-cryptography-and-quantum-cryptography/, accessed May 24, 2020.
- 27.
https://quantumxc.com/quantum-cryptography-explained/, accessed on May 04, 2020. This reference has been consulted for the information discussed after note no. 22. At places the inputs presented as verbatim from the source consulted.
- 28.
https://www.wired.com/insights/2014/09/quantum-key-distribution/, accessed on Jun 02, 2020.
- 29.
Cardinal [5].
- 30.
https://qt.eu/understand/underlying-principles/quantum-key-distribution-qkd/, accessed on June 02, 2020.
- 31.
https://qt.eu/understand/underlying-principles/quantum-key-distribution-qkd/, accessed on June 02, 2020 and https://cordis.europa.eu/project/id/857156, accessed on Jun 03, 2020.
- 32.
Korolov and Drinkwater [6].
- 33.
Haitjem [7].
- 34.
Mafu and Senekane [8].
- 35.
Peng et al. [9].
- 36.
https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun 05, 2020.
- 37.
Is an asymmetric encryption algorithm (1978) by Robert McEliece. It use randomization in the encryption process. This not so popular encryption algorithm, is a candidate for “post-quantum cryptography”, since it is immune to attacks using Shor's algorithm.
- 38.
Bernstein·et al. [10].
- 39.
Bernstein and Lange [11].
- 40.
Derek [12].
- 41.
https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun 05, 2020.
- 42.
https://www.insidequantumtechnology.com/quantum-key-distribution-vs-post-quantum-cryptography/, accessed on Jun05, 2020.
- 43.
Bernstein and Lange [13].
- 44.
Fernández-Caramés and Fraga-Lamas [14].
References
Kessler GC (2020) An overview of cryptography, 26 April 2020. https://www.garykessler.net/library/crypto.html. Accessed 13 May 2020
Barker EB, Barker WC, Lee A (2005) Guideline for implementing cryptography in the federal government. NIST Spec Publ 800–21:4
Diffie W, Hellman ME (1979) Privacy and authentication: an introduction to cryptography. In: Proceedings of IEEE, vol 67, no 3, Mar 1979, pp 397–427
Aditya J, Shankar Rao P (2020) Quantum cryptography. https://cs.stanford.edu/people/adityaj/QuantumCryptography.pdf. Accessed 25 May 2020
Cardinal D (2019) Quantum computing can soon help secure the power grid. https://www.extremetech.com/electronics/286893-quantum-computing-can-soon-help-secure-the-power-grid. Access 23 Dec 2019
Korolov M and Drinkwater D (2020) What is quantum cryptography? It’s no silver bullet, but could improve security. https://www.csoonline.com/article/3235970/what-is-quantum-cryptography-it-s-no-silver-bullet-but-could-improve-security.html. Accessed 10 May 2020. Lattice cryptography is the favourite at present, simply because it’s the most practical to implement
Haitjem M (2018) A survey of the prominent quantum key distribution protocols. https://www.cse.wustl.edu/~jain/cse571–07/ftp/quantum/#BB84. Accessed 04 Jun 2020 and Nurhadi AI, Syambas NR (2018) Quantum Key Distribution (QKD) protocols: a survey. In: 2018 4th international conference on wireless and telematics (ICWT), Nusa Dua, 2018, pp 1–5
Mafu M, Senekane, M (2020) Security of quantum key distribution protocols, Chapter 1, p 6. https://www.intechopen.com/books/advanced-technologies-of-quantum-key-distribution/security-of-quantum-key-distribution-protocols. Accessed 04 May 2020
Peng Q, Xiaodong W, Guo Y (2019) Improving eight-state continuous variable quantum key distribution by applying photon subtraction. Appl Sci 9(1333):1–9
Bernstein D, Buchmann J, Dahmen E (2009) Post-quantum cryptography. Springer, Heidelberg, p 11
Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549:188
Rice D (2020) Quantum cryptography and post-quantum cryptography? https://fedtechmagazine.com/article/2020/03/what-difference-between-quantum-cryptography-and-post-quantum-cryptography-perfcon. Accessed 04 June 2020
Bernstein D, Lange T (2017) Post-quantum cryptography. Nature 549:188–194
Fernández-Caramés TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lele, A. (2021). Quantum Cryptography. In: Quantum Technologies and Military Strategy. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72721-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-72721-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72720-8
Online ISBN: 978-3-030-72721-5
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)