首页    期刊浏览 2024年09月21日 星期六
登录注册

文章基本信息

  • 标题:Authenticated Transmission using Quantum Security
  • 本地全文:下载
  • 作者:V. Kishore ; M. Ramakrishna ; M.A.Baseer
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2012
  • 卷号:3
  • 期号:5
  • 页码:4956-4960
  • 出版社:TechScience Publications
  • 摘要:Now a day’s Security of network transmission became a vital aspect, because the major security risks occur while conducting business on the Net; the following are some of the security risks occur: Unauthorized-Access, Eavesdropping, Password Sniffing, Denial of Service, Data modification, Repudiation. One of the methods to secure the information is Cryptography. It Protects data transmitted over the network lines, is mainly through appropriate Encryption techniques. The subject Cryptography deals with the encryption and decryption procedures. Encryption is the process of scrambling information so that it becomes unintelligible and can be unscrambled only by using keys. Encryption is the achieved using a Symmetric (or) Asymmetric Encryption. In Symmetric Encryption, a single key is used encrypt as well as to decrypt. In Asymmetric Encryption, two keys namely public and private key are used for encryption and decryption. The paper presentation is on the Authenticated Transmission using Quantum Security. Quantum cryptography is a new method, which is efficient and fastest of all methods to secure the information. In this Quantum cryptography, main concept is Quantum theory of light, polarization. The foundation of Quantum cryptography lies in the Heisenberg’s Uncertainty Principle which states that “certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value of other”.
国家哲学社会科学文献中心版权所有