ABSTRACT
Cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography was born in the early seventies when Steven Wiesner wrote "Conjugate Coding", which took more than ten years to end this paper. The quantum cryptography relies on two important elements of quantum mechanics - the Heisenberg Uncertainty principle and the principle of photon polarization. The Heisenberg Uncertainty principle states that, it is not possible to measure the quantum state of any system without distributing that system. The principle of photon polarization states that, an eavesdropper can not copy unknown qubits i.e. unknown quantum states, due to no-cloning theorem which was first presented by Wootters and Zurek in 1982. This research paper concentrates on the theory of quantum cryptography, and how this technology contributes to the network security. This research paper summarizes the current state of quantum cryptography, and the real-world application implementation of this technology, and finally the future direction in which the quantum cryptography is headed forwards.
TABLE OF CONTENT
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.1BACKGROUND OF STUDY
1.2STATEMENT OF PROBLEM
1.3PURPOSE OF STUDY
1.4IMPORTANCE OF STUDY
1.5DEFINITION OF TERMS
1.6ASSUMPTION OF STUDY
CHAPTER TWO
2.0 LITERETURE REVIEW
2.1 CRYPTOGRAPHY
2.2 TYPES OF CRYPTOGRAPHIC ALGORITHMS
2.3 SECRET KEY CRYPTOGRAPHY
2.4 PUBLIC-KEY CRYPTOGRAPHY
CHAPTER THREE
3.0 CRYPTOGRAPHY EXPORT RESTRICTIONS
3.1 CRYPTOGRAPHIC INSTRUMENT
CHAPTER FOUR
4.0 SECURITY CONSIDERATION
4.1 SYMMETRIC CRYPTOGRAPHY
4.2 ASYMMETRIC CRYPTOGRAPHY
CHAPTER FIVE: CONCLUSION
5.1LIMITATION OF STUDY
5.2SUGGESTION FOR FURTHER RESEARCH
5.3 REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Using Cryptography In Information Technology.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/302/using-cryptography-in-information-technology
"Using Cryptography In Information Technology." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/302/using-cryptography-in-information-technology>.
"Using Cryptography In Information Technology.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/302/using-cryptography-in-information-technology>.
"Using Cryptography In Information Technology.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/302/using-cryptography-in-information-technology.
- Related Works
- Design And Implementation Of Code Optimization: Implementation Of Scalar Optimization
- The Design And Implementation Of Civil Service Promotion Scheme System. (a Case Study Of Local Government Service Commission Enugu)
- Design And Implementation Of An Automated Motor Vehicle Driver’s Licensing System. (a Case Study Of Enugu Motor License Office, Enugu State; Abakpa) Nike)
- Design And Implementation Of Online Student Registration System (case Study Of Imt Enugu)
- Design And Implementation Of A Computerized Information Management System In Seismic Data Processing
- Design And Implementation Of A Database Management Software For A Confectionery Business
- Design And Implementation Of A Computerized Information System In A Grocery Business
- Design And Implementation Of Network Analysis (case Study Of Imt Enugu)
- Design And Implementation Of A Computerized Visa Processing Information System (a Case Study Of British Embassy)
- Design And Implementation Of A Computerised Stadium Management Information System (case Study Of Nnamdi Azikiwe Stadium Enugu)