ijact-book-coverT

Survey on Information Security and Quantum Cryptography

© 2023 by IJACT

Volume 1 Issue 1

Year of Publication : 2023

Author : Masira Kulkarni, Prashant Dhotre

:10.56472/25838628/IJACT-V1I1P103

Citation :

Masira Kulkarni, Prashant Dhotre, 2023. "Survey on Information Security and Quantum Cryptography" ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 1, Issue 1: 11-18.

Abstract :

The number of Internet users globally peaked at 4.7 billion in early 2020, representing a startling 1,187% surge in just 20 years. In addition, our growing reliance on Internet-based technology produces enormous amounts of data (1 followed by 21 zeros!). A large portion of this data needs to be encrypted because it contains "sensitive" information. To make sure that only authorized persons in possession of encryption keys may access this data, we utilize sophisticated encryption technologies. Data may be encrypted, or made into information that can only be decoded by someone with the right "key," by converting plain text into scrambled data. Quantum cryptography, then, is the application of quantum physics to the encryption and transmission of data in an unbreakable manner. This study will address the limitations of the traditionally employed encryption algorithm, some literature reviews, and the concept of quantum cryptography along with its working structure, limitations, and applications.

References :

[1] Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., & Mishra, A. K. (2021). Quantum Key Distribution Secured Optical Networks: A Survey. IEEE Open Journal of the Communications Society, 2, 2049–2083. doi:10.1109/ojcoms.2021.3106659.

[2] Tsai, C.-W.; Yang, C.-W.; Lin, J.; Chang, Y.-C.; Chang, R.-S. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Appl. Sci. 2021, 11, 3767. https://doi.org/10.3390/ app11093767.

[3] Abushgra, A.A. Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review. Cryptography 2022, 6, 12 https://doi.org/ 10.3390/cryptography6010012.

[4] N.Sasirekha, M.Hemalatha, Quantum Cryptography using Quantum Key Distribution and its Applications. International Journal of Engineering and Advanced Technology. Volume-3 Issue-4, April 2014. ISSN: 2249-8958.

[5] Laszlo Gyongyosi, Laszlo Bacsardi, Sandor Imre. A Survey on Quantum Key Distribution. Infocommunications Journal. 08 January 2021,Volume XI,Number 2. DOI: 10.36244/ICJ.2019.2.2.

[6] Huanguo Zhang, Zhaoxu Ji, Houzhen Wang , Wanqing Wu.Survey on Quantum Information Security.China Communications, October 2019.

[7] J. Aditya, P. Shankar Rao, Quantum Cryptography, Proceedings of computer society of India, 2005.

[8] Vishakha k. Ralegankar, Jagruti Bagul, Bhaumikkumar Thakkar, Rajesh Gupta,Sudeep Tanwar 1, Gulshan Sharma, And Innocent E. Davidson , Quantum Cryptography-as-a-Service for Secure UAV Communication: Applications, Challenges, and Case Study,IEEE Acess, Volume: 10, Page(s): 1475 – 1492, DOI: 10.1109/ACCESS.2021.3138753.

Keywords :

Cryptography Methods, Quantum Cryptography, Quantum Key Distribution (QKD), Photon Polarization Methods.