Chapter 16

Quantum Cryptography with an Emphasis on the Security Analysis of QKD Protocols

Radhika Kavuri

Radhika Kavuri

Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India

Search for more papers by this author
Santhosh Voruganti

Santhosh Voruganti

Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India

Search for more papers by this author
Sheena Mohammed

Sheena Mohammed

Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India

Search for more papers by this author
Sucharitha Inapanuri

Sucharitha Inapanuri

Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India

Search for more papers by this author
B. Harish Goud

B. Harish Goud

Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India

Search for more papers by this author
First published: 29 May 2023

Summary

Quantum computing is a fast-developing technology that uses the principles of quantum physics to solve issues that are too complicated for conventional computers. Even the most complex mathematical computations performed in conventional cryptographic algorithms can easily be hacked using quantum computers. Hence, cryptologists are recently looking into developing new quantum hard cryptographic algorithms that are secure against quantum computers. Quantum cryptography employs the inherent features of quantum physics in order to secure and transmit data in a way that cannot be intercepted. Quantum cryptography is emerging as a game changing technology in various domains including privacy preserving, secure online voting, banking, and manufacturing industries. This chapter covers basic terminology and concepts of quantum cryptography, trends in quantum cryptography, an in-depth overview of Quantum Key distribution protocols along with their vulnerabilities and future research foresights.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.