24Quantum Cryptography – A Security Architecture

Sunandani Sharma1*, Sneha Agrawal1, Sneha Baldeva2, Diya Dabhade2, Parikshit Bais2 and Ankita Singh3

1Tata Consultancy Services (TCS), Indore, India

2Department of Computer Science Engineering, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India

3Department of Information Technology, Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore, India


The principle of the known quantum physics ensures the origin for “quantum cryptography” [for encryption and decryption algorithms]. The quantum mainly executes and expected to get out of discrete logarithmic for them such as AES, RSA, DES. The quantum real key distribution is the key process which would be divided b/w only 2 people known as cryptographic strategies. Information of all security now has the most crucial procedure for gathering and exchanging due to the unique understanding of data diffusion in network surroundings and increase the attackers’ possibilities. In contrast, to convey this security information, secure encryption techniques will be used to authorise the secrecy, data integrity, and data origin authentication. This chapter describes the development of the AES algorithm, which is regarded as the best symmetric encryption technique, the increasing attention on the interconnection between newly developed AES-oriented S-Boxes and the carefully selected secret key generator from quantum key distribution.

Keywords: Advanced encryption standards, Shamir-Adleman, ...

Get Quantum Computing in Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.