Professional Documents
Culture Documents
Quantum cryptologyIntroduction
Symmetric key encryption uses the same cryptographic algorithm and the same
key to encipher and decipher messages symmetric key encryption uses the same
key repeatedly to encipher and decipher messages. This makes it inherently less
secure.
Asymmetric key encryption is also known as public key encryption. As the name
implies, it requires two different but mathematically related keys, one to encipher a
message and the other corresponding key to decipher the message. Since one of
the keys is known publicly, it is called the public key. The other key has to be kept
private with one or the other party to the secure communication.
The worm was released on September 18, 2001 exactly one week after the attacks
on the World Trade Center and Pentagon, Nimda affected mainly windows.
2)December 2010 - The Pakistan Cyber Army hacked into the website of India's
Central Bureau of Investigation.
3)Hackers orchestrated multiple breaches of Sony's PlayStation Network knocking
it offline for 24 days and costing the company an estimated $171 million. These
reports and others have raised a serious concern by government and industry that
have placed network security on high national priority and an Internet Security
Alliance was formed.
To achieve perfect secrecy, the key must be at least as long as the message and
never reused -- i.e. Vernam ciphers must be employed. In 1917 during the First
World War the American scientist Gilbert Vernam was given the task of inventing an
encryption method the Germans could not break by AT&T.(American multinational
telecommunications) His encryption scheme is unbreakable to this day.
For example, Assumes that it is relatively easy to multiply two large prime numbers
to get their product, but quite hard to factor that product into the two original
primes.
with current quantum key distribution technology . This limits the use of a QKD onetime pad to all but the most confidential transmissions.
It is my belief that the only thing that might stand in the way of an eventual
widespread adoption of quantum cryptography is its apparent strength. Since, if
properly implemented, it is inherently unbreakable, governmental security agencies
might want to restrict its use.There is no doubt that there are still quite difficult
technical problems to overcome, such as its limited range and low transmission
rate, before it will find widespread use in todays network infrastructure.
Hoping that this method will find its applications without any limitations.
THANK YOU