Quantum Cryptography

 

Quantum Cryptography


  • What is Quantum Cryptography?

Quantum cryptography is different than post-quantum cryptography or quantum-resistant cryptography. quantum cryptography takes advantage of the properties of quantum physics to encrypt information at the physical network layer. Post-quantum and quantum-resistant cryptography efforts, however, remain focused on developing encryption methods that rely on hard math problems—the kind that quantum computing is not well-suited to solve.


·       How Quantum Cryptography Works?

Qubits have an interesting property they settle on a single state when observed.  Today’s encryption methods can be avoid by side-channel attacks, man-in-the-middle attacks, and more. But the quirk of qubits makes it easy to tell if they’ve been observed. If they’ve settled on a single state, then you would know not to trust the message.

In this way, quantum cryptography could encrypt fiber networks—i.e. the physical layer—from end to end. With fiber cable running across the entire connection, in theory you would not need encryption at any other layer of the network.


·        IS Quantum Computer Threat to Cybersecurity?

Today’s RSA  (Rivest–Shamir–Adleman) encryption, a widely used form of encryption, particularly used for encrypting data on personal and professional on internet, is based on 2048-bit numbers. Experts guess that a quantum computer would need to be as large as 60 to 70 million qubits to break the RSA encryption. Considering the largest quantum computer in todays world is  53-qubit quantum computer, for breaking today encryption quantum computer need more qubit so in present it is not threat but in future it might be threat for cybersecurity. [1]

As the speed of quantum research continues to accelerate, though, the development of such a computer within the next 4-6 years cannot be ignored.  example   In 2018 Google and the KTH Royal Institute of Technology in Sweden reportedly found “a more efficient way for quantum computers to perform the decrypting calculations, reducing the resources they require by orders of magnitude.” Their work, Presented  in the MIT Technology Review, explained that a 20 million-qubit quantum computer could break a 2048-bit number encryption.

·       Disadvantages of Quantum Cryptography

The biggest problem right now is the problem you have with any new technology: it’s prohibitively expensive. Furthermore, it would require its own infrastructure. Post-quantum encryption has the advantage of compatibility with existing networks.

We also haven’t quite figured out quantum technology yet. Error rates are relatively high, and fiber-based quantum cryptography only works over fairly short distances. You could increase that distance with repeaters, but that would create weak spots. It’s also unlikely to have an entirely fiber-based connection.

Furthermore, society’s usually a step (or several) behind emerging hacking methods. And according to an MIT Technology Review article released this week, “some US experts think it could take at least 20 years to get quantum-proof encryption widely deployed.”

·       Applications  of Quantum Cryptography

Along with disadvantages Quantum cryptography has many applications such  as.

 

·       Conclusion

Current cybersecurity best practices call for multiple security layers. I expect that will remain true even as we perfect quantum technology. While the capabilities that quantum cryptography offer are powerful, a hybrid solution will likely be the best approach. In the short term, post-quantum cryptography looks more promising as a widely deployed solution.


THANK YOU !

Comments

Popular posts from this blog

Image Processing In Industrial Automation