A Comprehensive Survey on : Quantum Cryptography

Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.

[1]  B. Sangeetha,et al.  A Survey on Recent Security Trends using Quantum Cryptography , 2010 .

[2]  A. K. Singh,et al.  Quantum Key Distribution Protocols: A Review , 2014 .

[3]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[4]  Yu-Fang Chung,et al.  Unconditionally secure cryptosystems based on quantum cryptography , 2008, Inf. Sci..

[5]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[6]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[7]  Eduin H. Serna Quantum Key Distribution From A Random Seed , 2013, 1311.1582.

[8]  Hoi-Kwong Lo,et al.  A Survey on Quantum Cryptographic Protocols and Their Security , 2007, Canadian Conference on Electrical and Computer Engineering.

[9]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[10]  M. Redhead Quantum theory and measurement , 1984 .

[11]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .

[12]  Mostafa Azizi,et al.  Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.

[13]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[14]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[15]  Jaydip Sen Theory And Practice Of Cryptography And Network Security Protocols And Technologies , 2014 .

[16]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.