Quantum Cryptography: Overview, Security Issues and Future Challenges

被引:0
作者
Mitra, Saptarshi [1 ]
Jana, Bappaditya [1 ]
Bhattacharya, Supratim [1 ]
Pal, Prashnatita [2 ]
Poray, Jayanta [1 ]
机构
[1] Techno India Univ West Bengal, Dept Comp Sci & Engn, Kolkata, W Bengal, India
[2] St Thomas Coll Engn & Technol, Dept Elect & Commun Engn, Kolkata, W Bengal, India
来源
2017 4TH INTERNATIONAL CONFERENCE ON OPTO-ELECTRONICS AND APPLIED OPTICS (OPTRONIX) | 2017年
关键词
Encryption; decryption; digital signature; security; protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years Quantum Cryptography gets more attention as well as becomes most promising cryptographic field for faster, effective and more secure communications. Quantum Cryptography is an art of science which overlap quantum properties of light under quantum mechanics on cryptographic task instead of current state of algorithms based on mathematical computing technology. Major algorithms for public key encryption and some digital signature scheme such as RSA, El Gamal cryptosystem, hash function are vulnerable at quantum adversaries. Most of the factoring problem can be broken by Shore's algorithm and quantum computer threatens other hand discrete logarithm problem. Our paper describes why modern cryptography contributes quantum cryptography, security issues and future goals of modern cryptography.
引用
收藏
页数:7
相关论文
共 20 条
  • [1] Abraham A., ADV INTELLIGENT SYST, V420
  • [2] Acharya Kamalesh, LNCS
  • [3] Using quantum key distribution for cryptographic purposes: A survey
    Alleaume, R.
    Branciard, C.
    Bouda, J.
    Debuisschert, T.
    Dianati, M.
    Gisin, N.
    Godfrey, M.
    Grangier, P.
    Laenger, T.
    Luetkenhaus, N.
    Monyk, C.
    Painchault, P.
    Peev, M.
    Poppe, A.
    Pornin, T.
    Rarity, J.
    Renner, R.
    Ribordy, G.
    Riguidel, M.
    Salvail, L.
    Shields, A.
    Weinfurter, H.
    Zeilinger, A.
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 62 - 81
  • [4] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
  • [5] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [6] Selecting elliptic curves for cryptography: an efficiency and security analysis
    Bos, Joppe W.
    Costello, Craig
    Longa, Patrick
    Naehrig, Michael
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 259 - 286
  • [7] Goyall Aakash, 5 IEEE INT C ADV COM
  • [8] Grzywak A., 2009, ADV INTELLIGENT SOFT, V64
  • [9] Guleria Vandana, LNCS
  • [10] Three-party quantum secure direct communication against collective noise
    He, Ye-Feng
    Ma, Wen-Ping
    [J]. QUANTUM INFORMATION PROCESSING, 2017, 16 (10)