Cryptography based on quantum mechanical phenomena
Compare post-quantum cryptography, which is any cryptography (nonquantum or quantum) that resists cryptanalysis that uses quantum computing.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.[1][2] The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed due to wave function collapse (no-cloning theorem). This could be used to detect eavesdropping[how?] in quantum key distribution (QKD).
^Gisin, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang; Zbinden, Hugo (2002). "Quantum cryptography". Reviews of Modern Physics. 74 (1): 145–195. arXiv:quant-ph/0101098. Bibcode:2002RvMP...74..145G. doi:10.1103/RevModPhys.74.145. S2CID 6979295.
^Pirandola, S.; Andersen, U. L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; Pereira, J. L.; et al. (2020). "Advances in quantum cryptography". Advances in Optics and Photonics. 12 (4): 1012–1236. arXiv:1906.01645. Bibcode:2020AdOP...12.1012P. doi:10.1364/AOP.361502. S2CID 174799187.
and 18 Related for: Quantum cryptography information
Quantumcryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
applied quantum theory to cryptography protocols and demonstrated that quantum key distribution could enhance information security. Quantum algorithms...
Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
interdisciplinary field that involves quantum mechanics, computer science, information theory, philosophy and cryptography among other fields. Its study is...
The Code Book: The Science of Secrecy from Ancient Egypt to QuantumCryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday...
suitable materials for quantum computer manufacturing. Majorana fermions may be a crucial missing material. Quantumcryptography devices are now available...
common archetypes in many scientific and engineering fields, such as quantumcryptography, game theory and physics. As the use of Alice and Bob became more...
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...
of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantumcryptography standards...
A quantum money scheme is a quantumcryptographic protocol that creates and verifies banknotes that are resistant to forgery. It is based on the principle...
some). Entanglement is used in some protocols of quantumcryptography, but to prove the security of quantum key distribution (QKD) under standard assumptions...
information. An inherent advantage yielded by quantumcryptography when compared to classical cryptography is the detection of passive eavesdropping. This...
trapdoor function. It won the NIST competition for the first post-quantumcryptography (PQ) standard. NIST calls its draft standard Module-Lattice-Based...
recovers the original quantum state. The following quantum circuit describes teleportation: Quantumcryptography is the use of quantum mechanical properties...
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
suitable for use in cryptography. It is also loosely known as a cryptographic random number generator (CRNG). Most cryptographic applications require...