International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.

Keywords: Cryptography, Communication, Key Distribution, Quantum Cryptography, Security attacks,

Edition: Volume 4 Issue 4, April 2015

Pages: 2214 - 2220


How to Cite this Article?

Pranav Verma, Ritika Lohiya, "A Comprehensive Survey on: Quantum Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153561, Volume 4 Issue 4, April 2015, 2214 - 2220

42 PDF Views | 30 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this article

Comparative Studies, Computer Science & Engineering, Nigeria, Volume 4 Issue 4, April 2015

Pages: 731 - 741

Comparative Analysis of Some Encryption Algorithms and Secured Remote Protocol

Ojekudo Nathaniel Akpofure Ph.D, Nwankwe Dimie M.Sc

Share this article



Similar Articles with Keyword 'Communication'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2505 - 2507

Performance Management in Network Management System

Shankar N, Dr. Shantharam Nayak

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1722 - 1729

Security on Cloud Computing: A Review

Rameshwari Malik

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1338 - 1343

Implementation of Adaptive Video Compression using Hybridized Wavelet Transform

Anurag Srivastava, Puneet Sharma

Share this article



Similar Articles with Keyword 'Key Distribution'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1684 - 1686

Secure Data Sharing In Multi-Owner for Dynamic Groups in Cloud

J. Pratheeka, Dr. M. Nagaratna

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 188 - 190

Performance Analysis of Various Secret Sharing Techniques

Surbhi Sharma, Pradeep Kumar

Share this article



Similar Articles with Keyword 'Quantum Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article



Similar Articles with Keyword 'Security attacks,'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 277 - 280

Survey on Secure Routing Protocols for MANETs

Shwetha T R, Dr Arun Biradar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1727 - 1731

Design of Secure, Reliable and Lightweight Communication in Trusted Wireless Sensor Network

Pradnya S. Kulkarni, Dr. Aarti Dixit

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 152 - 154

Multi-Level Cryptographic Key Sharing For Secure Access and Authorization on Cloud Platforms - A Review

Kuldeep Singh, Er. Amardeep Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1313 - 1318

Secure: Self-Protection Approach in Cloud Resource Management

Sangeetha G M, Lavanya S, Prashanth

Share this article
Top