The procedure of messages being encoded and decoded.

Answer to Problem 68E
Japan is working on testing new quantum cryptography methods that can be used to secure video conferencing for government communications.
Explanation of Solution
Cryptography is the study and practice of hiding information. There are a few examples of cryptography that are used in business and government to help prevent unwanted disclosure of messages and other types of information.
Symmetric Cryptography Symmetric cryptography includes methods of encryption that are best suited for processing large streams of data. It is distinguished the use of a single key for encrypting and decrypting messages by the sender and receiver.
This type of cryptography is categorized by the use of stream or block ciphers. Stream ciphers operate by encrypting single bits or bytes of information (or plaintext) at a time and implements a feedback mechanism to constantly change the key. Alternatively, block ciphers encrypts data into individual fixed group of bits (a common size is 128 bits) using the same key.
An advantage of symmetric cryptography is that its methods are inexpensive for creating and processing encrypted data. The disadvantage of this example of cryptography is that is both the sender and receiver of the message have to agree on the key. If the key is discovered, the encrypted information becomes compromised.
The following are popular examples of cryptography that have used symmetric encryption:
International Data Encryption Method (IDEA)
Advanced Encryption Standard (AES)
Data Encryption Standard (DES)
Two Fish is a 128 bit block cipher that uses 128/192/256 bit keys.
Camelia is similar to AES and uses 128 bit block cipher. Used in 32 bit processors and 8 bit processors (smart cards)
Misty 1 - Made by Mitsubishi. It is a 128 bit block cipher and used in computer hardware/software.
Skipjack Asymmetric Cryptography
Asymmetric cryptography (also called public key cryptography) encryption methods are best used for key exchange and user authentication. This type of cryptography is commonly used in digital signatures. It is distinguished by the use of a private and public key that are created with one-way functions using multiplication and exponentiation. One key is public and published in a public directory while the private key is only known by the receiver of the message.
The following are applications that use asymmetric cryptography:
Transport Layer Standard (T LS), a communications protocol which is replacing Secure Socket
Layer (SSL) for transmitting data over the internet
RSA is used in electronic commerce protocols, software production, key exchange and digital signatures. It implements a variable size encryption block and key.
PGP (or Pretty Good Privacy) is used for the authentication of data communication and encrypting/decrypting email messages.
GnuPG/GPG — GNU Privacy Guard is a standard that tracks specifications of OpenPGP.
Elliptic Curve Cryptography
Elliptic curve cryptography is a standard method used by NIST, NSI and IEEE for government and financial institution use. It is based on public key encryption and used in mobile and wireless environments.
Public keys are created by utilizing the following algebraic equation -
The appeal of elliptic curve cryptography is that it offers security with smaller key sizes which result in faster computations, lower power consumption, memory and bandwidth use.
Quantum Cryptography Quantum cryptography methods use photons to create encrypted keys that can be sent over optical fiber networks by using beams of light. It uses”qubits", which is essentially a computer bit in quantum form. Keys are created using a procedure called quantum key distribution (QKD). In this method, photons are transmitted in horizontal and vertical directions with the use of a laser source over a quantum channel.
A unique property of this example of cryptography is its ability to detect the presence of anyone that tries to obtain the quantum key. Any attempt would be noticed by the sender and receiver by a high increase in the transmission error rate. Since photons cannot be copied or divided keys are virtually unbreakable.
Currently, these types of method can only produce and distribute and encrypted keys. However as of 2010, Japan is working on testing new quantum cryptography methods that can be used to secure video conferencing for government communications.
Conclusion:
Japan is working on testing new quantum cryptography methods that can be used to secure video conferencing for government communications.
Chapter 8 Solutions
EBK PRECALCULUS W/LIMITS
- x-4 For the function f(x): find f'(x), the third derivative of f, and f(4) (x), the fourth derivative of f. x+7arrow_forwardIn x For the function f(x) = find f'(x). Then find f''(0) and f''(9). 11x'arrow_forwardLet f(x) = √√x+3 and g(x) = 6x − 2. Find each of the following composite functions and state the domain: (a) fog (b) gof, (c) fof (d) gogarrow_forward
- Compute the following: (a) 8x³ + 3x dx (b) cos(2u) du (c) f² ebx dxarrow_forwardFind the following limits. (a) lim 3(x-1)² x→2 x (b) lim 0+x (c) lim 3x2-x+1 x²+3 x²+x-12 x-3 x-3arrow_forwardFor f(x) = (x+3)² - 2 sketch f(x), f(x), f(x − 2), and f(x) — 2. State the coordi- nates of the turning point in each graph.arrow_forward
- Write an equation for the polynomial graphed below. It will probably be easiest to leave your "a" value as a fraction. 8 7 + 9+ H 6 5 4 3 + 3 2 1 (-30) (-1,0) (1,0) (3,0) + -5 -4 -3 -2 2 3 4 7 2 -1 -2 3 (0,-3) f(x) = 456 -4 -5 -6+arrow_forwardWrite an equation for the polynomial graphed below 5+ 4 - 3 2 1 + + -5 4-3 -2 -1 1 2 3 4 5 -1 -2 y(x) = -3 -4 5 -5+ Qarrow_forwardWrite an equation for the polynomial graphed below 6+ 5 + -5 -4 3 y(x) = 4 3 2 1 -1 1 1 -1 -2 -3 -4 -5 2 3 4 5arrow_forward
- Calculus: Early TranscendentalsCalculusISBN:9781285741550Author:James StewartPublisher:Cengage LearningThomas' Calculus (14th Edition)CalculusISBN:9780134438986Author:Joel R. Hass, Christopher E. Heil, Maurice D. WeirPublisher:PEARSONCalculus: Early Transcendentals (3rd Edition)CalculusISBN:9780134763644Author:William L. Briggs, Lyle Cochran, Bernard Gillett, Eric SchulzPublisher:PEARSON
- Calculus: Early TranscendentalsCalculusISBN:9781319050740Author:Jon Rogawski, Colin Adams, Robert FranzosaPublisher:W. H. FreemanCalculus: Early Transcendental FunctionsCalculusISBN:9781337552516Author:Ron Larson, Bruce H. EdwardsPublisher:Cengage Learning





