Cooper_Assignment #7

docx

School

American Military University *

*We aren’t endorsed by this school

Course

266

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by UltraLemur3395

Report
Cooper: Assignment 7 Zachary Cooper Cryptography Concepts: ISSC266 Doctor Leonard Simon May 21, 2023
2 Assignment 7 Quantum theory is based on a concept that nature and behavior of matter is on the atomic and subatomic level (Wigmore, 2020). This theory is reliant for the future of cryptography not only in the sense of making information impenetrable but also to penetrate current forms of cryptography. Whoever figures what first will have a definite advantage. The goal of quantum cryptography specifically is to create algorithms that cannot be brokem, especially with current means (Caltech). Quantum computing will eliminate the time-consuming process of factoring large numbers like in algorithms such as RSA. Quantum key distribution is a studied and tried method of quantum cryptography. This method use a photons to transmit the cryptography key. Measurements of the transmission, with their microscopic size, will serve as a means of authenticity to determine if the information was compromised. The photons being transmitted will change measurement if someone disturbs them. This follows the uncertainty principle in quantum theory where an action will change the measurement of another action (Caltech). Quantum cryptography is very hard to achieve and relies on the ability to put quantum mechanics into practice. Additionally, it is difficult to achieve great distance with quantcum computing due to the current need of having fiber directly connected, even the use of relays and satellites still has shorter distances than current method of cryptography (Gillis, 2022).
3 Assignment 7 References Caltech. Accessed on 19 May 2023 . How Will Quantum Technologies Change Cryptography? https://scienceexchange.caltech.edu/topics/quantum-science-explained/quantum- cryptography#:~:text=Quantum%20cryptography%20uses%20the%20laws,that %20makes%20undetected%20eavesdropping%20impossible. Gillis, A. (2022). quantum cryptography. https://www.techtarget.com/searchsecurity/definition/quantum-cryptography Wigmore, I. (2020). Quantum theory. https://www.techtarget.com/whatis/definition/quantum- theory#:~:text=Quantum%20theory%20is%20the%20theoretical,quantum%20physics%2 0and%20quantum%20mechanics.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help