Quantum Mechanics and Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Cryptography is the way of making data or messages more secure and private. It is the oldest techniques to secure data. This technique is based on algorithms and mathematical calculation. The main problem of this technique is key distribution or storing key or key generation. Anyone can hack key on net if he/she know the algorithm used in key generation process easily. It may take a day to years. But if we distribute key using light and quantum mechanics it will be much more secure. It will take million of years to hack it because it is not based on mathematical computation that can be guess easily. So; our data becomes more secure and private which is much more precious now a day.

Keywords: Cryptography, quantum, encryption, decryption, key distribution, photon

Edition: Volume 3 Issue 5, May 2014

Pages: 963 - 966

Share this Article

How to Cite this Article?

Shiv Kumar, Shrawan Kumar, Bimlendu Verma, "Quantum Mechanics and Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131986, Volume 3 Issue 5, May 2014, 963 - 966

126 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'quantum'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2045 - 2047

A Comparative Parameters Analysis of Different Round Robin Scheduling Algorithm using Dynamic Time Quantum

Payal T. Sonagara, Viral D. Sanghvi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 997 - 999

Round Robin CPU Scheduling Using Dynamic Time Quantum with Multiple Queue

Sonagara Payal T.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 573 - 577

Implementation of Quantum dot Cellular Automata based Novel Full Adder and Full Subtractor

Peer Zahoor Ahmad, Firdous Ahmad, Syed Muzaffar Ahmad, Dr. Rafiq Ahmad Khan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this Article

Similar Articles with Keyword 'encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Similar Articles with Keyword 'decryption'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'key distribution'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1824 - 1829

A Combinational Approach Using Matrix Based Pairwise Key Establishment and Post Deployment Approach in Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1148 - 1153

ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS

Abdul Jawad PP, Bismin Chacko

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Share this Article

Similar Articles with Keyword 'photon'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1038 - 1041

Optical Computers: A New Era of High Speed Computing Based On Photons

Sharat Chandra, Ruchi Patira

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this Article
Top