Quantum Cryptography: Principle and Applications

Authors

  • Sumit Kumari Ph.D. Scholar, Department of physical science, Sunrise University, Alwar
  • Dr. Anil Kumar Associate Professor, Department of physical science, Sunrise University, Alwar

DOI:

https://doi.org/10.53573/rhimrj.2025.v12n5.018

Keywords:

Quantum Cryptography, Quantum Key Distribution (QKD), BB84 Protocol, Future of Quantum Cryptography

Abstract

Quantum cryptography is groundbreaking way to make communication super secure using science of quantum mechanics. Solving hard math problems to keep thing safe, quantum cryptography uses the laws of nature making it much harder for anyone, even powerful quantum computer to break. BB84 and E91 are Special recipes help set up secure communication using quantum mechanics. Quantum cryptography examines real -world implementations, current challenges and potential future directions including post-quantum cryptography and quantum networks. Quantum cryptography could redefine cybersecurity by combining cutting-edge science with innovative technology to protect sensitive information.

References

C. H. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 1984.

A. K. Ekert, "Quantum cryptography based on Bell's theorem," Physical Review Letters, vol. 67, no. 6, pp. 661-663, 1991.

M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2010.

Stebila, D., & Mosca, M. (2016). Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project. Proceedings of the 9th International Conference on Post-Quantum Cryptography.

Ben-Or, M., & Mayers, D. (2004). General security definition and composability for quantum and classical protocols. Proceedings of the Theory of Cryptography Conference (TCC).

Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution.

Physical Review A, 61(5), 052304.

Pirandola, S., Laurenza, R., Ottaviani, C., & Banchi, L. (2017). Fundamental limits of repeaterless quantum communications. Nature Communications, 8(1), 15043.

Downloads

Published

2025-05-15

How to Cite

Kumari, S., & Kumar, A. (2025). Quantum Cryptography: Principle and Applications. RESEARCH HUB International Multidisciplinary Research Journal, 12(5), 145–152. https://doi.org/10.53573/rhimrj.2025.v12n5.018