International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015


A Comprehensive Survey on: Quantum Cryptography

Pranav Verma [2] | Ritika Lohiya


Abstract: Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. An important and unique property of quantum cryptography is the ability of the two communicating users to detect the presence of any third party trying to gain knowledge of the key. The security of quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography which relies on the computational difficulty of certain mathematical functions, and cannot provide any indication of eavesdropping or guarantee of key security. In this paper we are discussing about various protocol introduced, possible attacks on them and prevention of those attacks.


Keywords: Cryptography, Communication, Key Distribution, Quantum Cryptography, Security attacks,


Edition: Volume 4 Issue 4, April 2015,


Pages: 2214 - 2220


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pranav Verma, Ritika Lohiya, "A Comprehensive Survey on: Quantum Cryptography", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 2214-2220, https://www.ijsr.net/get_abstract.php?paper_id=SUB153561

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [12] | R. Sathya [8]

Share this Article
Top