Quantum Cryptography on Quantum Computing

Rachit Mehta
4 min readJun 9, 2021

--

Q.1 What is Quantum?

Quantum

Ans. 1. “Quantum” is the Latin word for “amount” and, in modern understanding, means the smallest possible discrete unit of any physical property, such as energy or matter.

2. Quantum came into the latter usage in 1900, when the physicist Max Planck used it in a presentation to the German Physical Society.

Q.2 What is Quantum cryptography?

Ans. 1. Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.

2. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem.

Q.3 How did Quantum Cryptography discovered?

Cryptography

Ans. 1. In late 1960’s Stephen Wiesner from Colambia University and Charles Bennett from Harvard University came together on the Beach of a Posh Hotel at San Jaun, Duerto Rico for the Unforgeable Bank Notes which led the idea of Quantum Cryptography and published a paper named “Conjugate Coding”.

2. The Charles Bennett and Giles Brassard had put forward the theory of Quantum Key Distribution by BB84 Protocol both their surname’s initials in December 1984 at Bangalore which was helped by their best friend Vijay.

The Quantum Key Distribution Protocol

3. This idea was further carried forward by Artur Ekert which generated the Quantum Key Distribution Protocol with the name BB84 on 1990.

Q.4 Why Quantum Computing and Quantum Cryptography?

Ans. 1. Quantum Computing is the next future of the world which makes the work 100x faster as it simultaneously carries the bits 0 &1 both at the same time in which the guess work is more accurate in comparison with the usual classical computers that are very slow.

2. As the technology is growing faster the Quantum Cryptography comes into the picture which makes the security more confidential and very difficult for encryption. Cryptology is divided into cryptography and cryptanalysis.

3. Secure quantum communication, i.e., quantum key distribution (QKD), is on the forefront of the commercialization of future quantum technologies. Since its first theoretical proposal, it has been one of the major driving forces to investigate and apply quantum features for future information processing schemes.

4. Quantum cryptography, also called quantum encryption, applies principles of quantum mechanics to encrypt messages in a way that it is never read by anyone outside of the intended recipient. It takes advantage of quantum’s multiple states, coupled with its “no change theory,” which means it cannot be unknowingly interrupted.

Q.5 What are the challenges in Quantum Cryptography?

Ans. 1. Quantum cryptography is still in its infancy. But we cannot ignore the challenges it brings to the security of existing cyberspace.

2. In 1994, mathematician Shor has proposed the quantum algorithm by which the integer factorization problem and the discrete logarithm problem can be efficiently solved in polynomial time.

(Note that so far researchers have not found the classical algorithm to solve the large integer decomposition and the discrete logarithm problem efficiently under the Turing machine model.)

3. Therefore, the challenge of the emergence of quantum computers to the traditional cryptosystems cannot be ignored even if it is still in its infancy.

REFERENCES:

1. Kapil Kumar Soni ; Akhtar Rasool, Cryptographic Attack Possibilities over RSA Algorithm through Classical and Quantum Computation, IEEE 2018
2. Mehrdad S. Sharbaf, Quantum Cryptography: A New Generation of Information Technology Security System, IEEE 2009
3. Ms. V. Padmavathi, Dr. A. V. N. Krishna, Dr. B. Vishnu Vardhan, Quantum Cryptography and Quantum Key Distribution Protocols: A Survey, IEEE 2016
4. Gilles Brassard, Brief History of Quantum Cryptography: A Personal Perspective, IEEE 2005
5. Marcin Niemiec and Andrzej R. Pach, Management of Security in Quantum Cryptography, IEEE 2013
6. Ashish Nanda, Deepak Puthal, Saraju P. Mohanty, and Uma Choppali, A Computing Perspective on Quantum Cryptography, IEEE 2018
7. Chi-Yuan Chen, Guo-Jyun Zeng, Fang-Jhu Lin, Yao-Hsin Chou, and Han-Chieh Chao, Quantum Cryptography and Its Applications over the Internet, IEEE 2015

Quantum Computer Supremacy

--

--

Rachit Mehta
Rachit Mehta

Written by Rachit Mehta

Bridging Gap between Artistic Techie's simply by Using Technological Advancements for Mankind https://www.linkedin.com/in/rachit-mehta-649a76203