International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Cryptography is the way of making data or messages more secure and private. It is the oldest techniques to secure data. This technique is based on algorithms and mathematical calculation. The main problem of this technique is key distribution or storing key or key generation. Anyone can hack key on net if he/she know the algorithm used in key generation process easily. It may take a day to years. But if we distribute key using light and quantum mechanics it will be much more secure. It will take million of years to hack it because it is not based on mathematical computation that can be guess easily. So; our data becomes more secure and private which is much more precious now a day.

Keywords: Cryptography, quantum, encryption, decryption, key distribution, photon

Edition: Volume 3 Issue 5, May 2014

Pages: 963 - 966


How to Cite this Article?

Shiv Kumar, Shrawan Kumar, Bimlendu Verma, "Quantum Mechanics and Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131986, Volume 3 Issue 5, May 2014, 963 - 966

14 PDF Views | 12 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Similar Articles with Keyword 'quantum'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 997 - 999

Round Robin CPU Scheduling Using Dynamic Time Quantum with Multiple Queue

Sonagara Payal T.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 573 - 577

Implementation of Quantum dot Cellular Automata based Novel Full Adder and Full Subtractor

Peer Zahoor Ahmad, Firdous Ahmad, Syed Muzaffar Ahmad, Dr. Rafiq Ahmad Khan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2045 - 2047

A Comparative Parameters Analysis of Different Round Robin Scheduling Algorithm using Dynamic Time Quantum

Payal T. Sonagara, Viral D. Sanghvi

Share this article

Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 709 - 711

Survey on K-Nearest Neighbor Categorization over Semantically Protected Encrypted Relational Information

Pranali D. Desai, Vinod S. Wadne

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3273 - 3277

Homomorphic Encryption & A Novel Key Management Technique to Support Data Aggregation in Mobile Sensing

Farhat Afshan, Shameem Akther

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Similar Articles with Keyword 'decryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this article

Similar Articles with Keyword 'key distribution'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1684 - 1686

Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud

J. Pratheeka, Dr. M. Nagaratna

Share this article

Similar Articles with Keyword 'photon'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1038 - 1041

Optical Computers: A New Era of High Speed Computing Based On Photons

Sharat Chandra, Ruchi Patira

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article

Top