Enhancement of Network Security Techniques using Quantum Cryptography
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography, which in theory can efficiently compute the hard mathematical problems classical cryptography relies on. This paper makes a comparison between classical cryptography and quantum cryptography and outlines the increased security level provided by quantum cryptography
Authors and Affiliations
Navleen Kaur , Dr. Amardeep Singh , Sarabpreet Singh
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
Analyzing Theoretical Basis and Inconsistencies of Object Oriented Metrics
Metrics help in identifying potential problem areas and finding these problems in the phase they are developed decreases the cost and avoids major ripple effects from these in later development stages. These days, Object...
A Comparative Study for Deblured Average Blurred Images
This paper attempts to undertake the study of Restored Average Blurred Images. by using three types of techniques of deblurring image as Wiener filter, Regularized filter and Lucy Richardson deconvlutoin algorithm with a...
Context Ontology Construction For Cricket Video
Content based video retrieval systems are not complete in semantic sense. To improve the efficiency and the effectiveness of the retrieval system the content based retrieval systems must be equipped with the semantic bas...
PRESERVING PRIVACY IN DATA MINING USING SEMMA METHODOLOGY
The huge amount of data available means that it is possible to learn a lot of information about individuals from public data. Here, this open data need to be sheltered from unlawful contact. The privacy-preserving data m...