Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Shedding Light on Quantum Cryptography
#1

Shedding Light on Quantum Cryptography

[attachment=16952]
Introduction
As data is stored on hard drives, flash drives, discs, and such it would be satisfying to have a
peace of mind that its integrity will maintain uncompromised. Data can become vulnerable to
devastation by hard drive failures or malfunctions in the electronics of the PC. It is for this
reason data backups are created, or arrays of disks for data retrieval is established by having it
spread out amongst other discs and create an index of where it all is stored. But while data
remains intact and appears to be safe from hardware failures, the need to protect it from prying
eyes or foreign systems has become a must. Several ideas in the form of intellectual property, or
system designs for a corporate airline are desired to be kept secure and away from those that
would benefit from their exposure.

Cryptography
Cryptography has a Greek foundation that is translated to mean hidden or to be secret . As
mentioned above, hidden messages have existed for centuries, but modern day cryptography has
an assumed meaning to apply with computer systems and their storage or transmitting of data.
More specifically, cryptography involves the process and utilization of mathematics,
engineering, and computer science to turn ordinary data into an unreadable nonsense cluster of
data that only the intended recipient should be able to translate (Vittorio, 2002).

Quantum Mechanics
In order to understand quantum cryptography, a basic understanding of quantum mechanics
needs to be discussed. Quantum mechanics refers to the principles surrounding all physical
systems at the subatomic level. Amongst other objects, as it applies to the topic here, it describes
the characteristics of light waves, or photons, and the prediction of probabilities these particles
with undergo in application. The direction and movement of photons are better understood,
applying the theorem of quantum mechanics, and appear to be able to be regulated in such a way
that they are controlled (Wikipedia, 2009).

Cryptography Tribulations
The main function of cryptography is to hide messages (data) from the interceptor or
eavesdropper. In order to successfully decrypt a message that has been encrypted is by knowing
the method of encryption, cipher, and having the key for decrypting it. In the modern era of
encryption, the key is used in conjunction with the plaintext as an input to the algorithm that
encrypts the data, and in the same respect, decrypts it. These keys are essential to having the
decrypting solution and are considered sacred. As long as the key is secure, the encrypted text,
cryptogram, can be sent entirely across public networks without much worry. If it is intercepted,
the message cannot be deciphered without the key.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.