Total views : 395

Quantum Cryptography: A Review


  • Department of CS and IT, Dr. B.A.M.U., Aurangabad–431004, Maharashtra,, India
  • Department of Computer Science, NDA, Khadakwasla, Pune–411023, Maharashtra,, India


Background/Objectives: The preferment from conventional computing to quantum computing has created new challenges in the field of cryptography. The cryptographic algorithms which ensured intractability in conventional computing surfaces serious challenge in quantum computing. Methods/Statistical Analysis: By applying the quantum mechanics quantum cryptography can be used to unrestrictedly for reliable data communications. Findings: The cryptography currently in use, known as conventional cryptography, depends absolutely on the hardness of the mathematical concepts. Elliptical curve cryptography today known as modern cryptography is used extensively for securing financial transactions. Advances in quantum computing, can easily break this security by reverse computing keys faster than the conventional computers. Application/Improvements: This paper is an attempt to review fundamentals of quantum cryptography to as to represent it in easiest possible way for a novice demonstrating quantum onetime pad.


Conventional Cryptography, Density Matrix, Quantum Cryptography, Quantum One Time Pad

Full Text:

 |  (PDF views: 392)


  • Sasirekha N, Hemalatha M, Quantum Cryptography using Quantum Key Distribution and its Applications, International Journal of Engineering and Advanced Technology (IJEAT). 2014 April; 33(4):2249−8958.
  • Rohit Kumar, Samudra Gupt Maurya, Ritika Chugh, Manoj PV. Current Refuge Trends using Classical and Quantum Cryptography, Internatinal Journal of Computer Science and Information Technologies. 2014; 5(3):2974−77.
  • Hiskett P, Hughes R, Lita E, Miller A, Nam S, Miller A, Nordholt J, Rosenberg D. Long-Distance Quantum Key Distribution in Optical Fibre., New Journal of Physics. 2006.
  • Martinez-Mateo, Jesus, David Elkouss, Vicente Martin. Key Reconciliation for High Performance Quantum Key Distribution, Scientific reports. 2013; 3.
  • Bennett CH. Quantum Cryptography using any Two Non Orthogonal States, Physical Review Letters.1992; 68(21):3121−24.
  • Bennett CH, Brassard G, Crepeau C, Maurer UM. Generalized Privacy Amplification, IEEE Transactions on Information Theory. 1995; 41(6):1915–23.
  • Choi KS, Chou CW, Deng H, Felinto D, Kimble HJ, Laurat J, Riedmatten H. Functional Quantum Nodes for Entanglement Distribution Over Scalable Quantum Networks, Science. 2007; 316(5829):1316–20.
  • Rishi Dutt Sharma. Quantum Cryptography: A New Approach to Information Security, International Journal of Power System Operation and Energy Management (IJPSOEM). 2011; 1(1).
  • Diffie Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory. 1976; 22:644−54.
  • Rivest RL, Shamir, Adleman L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Commun. ACM. 1978; 21:120−26.
  • ElGamal T. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Trans. Inform. Theory. 1985 Jul; IT−31(4).
  • Wiesner S. Conjugate Coding, Written Circa 1970 and Belatedly Published in Sigact News. 1983; 15(1).
  • Bennett CH, Brassard G, Breidbart S, Wiesner S. Quantum Cryptography, or Unforgeable Subway Tokens, Advances in Cryptology: Proceedings of Crypto 82, Santa Barbara, Plenum Press, (August 1982).
  • Shor PW. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, SIAM J. Comp. 1997; 26:1484. See also quant-ph/9508027.
  • Gottesman D. Chuang IL. Quantum Digital Signatures, quant-ph/0105032.
  • Fernando GSL. Brandão and Jonathan Oppenheim, Quantum One-Time Pad in the Presence of an Eavesdropper, Phys. Rev. Lett. Jan 2012.
  • Bennett CH, Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing, In Proc. IEEE Int. Conf. on Comp.,Sys. and Signal Process., Bangalore;1984. p. 175–79.
  • Shukla R, Prakash HO. Sampurna Suraksha: Unconditionality Secure and Authenticated One Time Pad Cryptosystem, IEEE Conference: International Conference on Machine Intelligence and Research Advancement; 2013. p. 174−178.
  • Millar V. Use of Elliptic Curves in Cryptography, CRYPTO. 1985; p. 417−26.
  • Menezes A, van Oorschot PC, Vanstone S., Handbook of Applied Cryptography, Boca Raton, FL: CRC Press; 1996.
  • Henle F. BB84 Demo. (2002).


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.