A note on Quantum Cryptography

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9

Abstract

Cryptography provides security for the information and personal details. The combination of 3AQKDP (implicit) and 3AQKDPMA (explicit) quantum cryptography is used to provide authenticated secure communication between sender and receiver. Cryptography provides following merits establishment of a secure connection which can prevent attacks such as eavesdropping, man-in-the-middle and replay. Applications of cryptography include computer passwords, bank account passwords, ATM machines, etc. However there are many other classical cryptography ways for securing ones particular data but they are currently unsafe and they cannot detect the existence of passive attacks such as eavesdropping, man-in-the-middle and replay. So by combining the classical cryptography with quantum cryptography we can achieve more benefits.

Authors and Affiliations

G. Ananda Rao , Muduganti Rathan Reddy , Y. Srinivas , J. Vijayasekhar , N. Vamsi Krishna , Ramakrishna Jaliparthi , V Manoj Shekhar , Venu Saggurthi , S. Usha Rani

Keywords

Related Articles

The Reality of Software Reverse Engineering Education in the Jordanian Universities and How to improve it

In order to apply reverse engineering in software industry in an efficient and effective way there should be a high awareness in software reverse engineering concepts, approaches, and tools for employees in the software...

New Design Metrics for Complexity Estimation in Object Oriented Systems

This paper proposes four design metrics of class level for early and effective feedback to manage the quality of object-oriented software. These metrics measure the complexity induced by the use of various object-oriente...

Analysis of Maintainability Models for Object Oriented System

There is always has been a demand to provide efficient and effective high quality software. There are various maintainability objects to provide better maintainability. The quality of good software design heavily effecti...

Analysis and Comparative Study of Clock Synchronization Schemes in Wireless Sensor Networks

Time synchronization is an important issue in wireless sensor networks. Many applications based on these WSNs assume local clocks at each sensor node that need to be synchronized to a common notion of time. Some intrinsi...

Dynamic Resource Allocation in Desktop Grids

Grid computing (or the use of computational grids) is the application of several computers to a single problem at the same time. In grid computing ,the computing becomes pervasive and individual users(or client applicati...

Download PDF file
  • EP ID EP130172
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

G. Ananda Rao, Muduganti Rathan Reddy, Y. Srinivas, J. Vijayasekhar, N. Vamsi Krishna, Ramakrishna Jaliparthi, V Manoj Shekhar, Venu Saggurthi, S. Usha Rani (2012). A note on Quantum Cryptography. International Journal on Computer Science and Engineering, 4(9), 1540-1544. https://europub.co.uk/articles/-A-130172