A new research about quantum cryptography will be presented at the 2012 AAAS Annual Meeting.
During the process of encryption, the related information cannot be accessed by an opponent, according to a speculation in quantum cryptography protocols. However, the decoding process has been used over several years for classical cryptography methods.
The security safeguarded by the laws of physics is offered by quantum cryptography. In this technique, the two parties share a secret key such as a random sequence of 0s and 1s that can be utilized for scrambling a message. The quantum laws with an incorporated eavesdropping detection provide security. Transmission of key using photons shows an alteration that can be detected by the legal parties. Insecure keys can be discarded.
The manipulation of key transmission can be facilitated by a malicious manipulator. With the degree of manipulation, the quantity of genuine randomness existing in the key can be calculated. This contributes in determining the specific quantity in the key that can be kept cryptic.
Artur Ekert, Director of the Centre for Quantum Technologies (CQT) at the National University of Singapore (NUS) and Professor at the University of Oxford, UK presented the two recent approaches on quantum cryptography at AAAS on 18th February.
The two twists to quantum cryptography include device independent cryptography wherein the quantum cryptography can be designed and used for secure communication, independent of the source of procurement. The second twist emphasizes that device-independent schemes exceed the information of the underlying physics.