0% found this document useful (0 votes)
13 views11 pages

Quantum Crptography Tables

Quantum cryptography................

Uploaded by

khandelwalranjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views11 pages

Quantum Crptography Tables

Quantum cryptography................

Uploaded by

khandelwalranjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Author’s Methodology Results Source/Dataset Research Gap

Name
The authors focus on two 1. BB84 and E91 The paper is based on Future research is to
main methods for secure protocols show strong theoretical research focus on making
data sharing using quantum security by detecting if and does not use quantum systems
key distribution (QKD), which anyone tries to intercept specific data from more affordable and
uses the unique properties the data. experiments or compatible with
Gourav Nagar
of quantum mechanics to datasets. It’s today’s technology.
(Texas A&M
keep data safe: 2. These protocols have references are old
University,
• BB84 Protocol: Uses many applications in studies based on
College
the unpredictable secure communication, quantum
Station)
nature of quantum banking, government, cryptography.
Ashok
particles. If anyone healthcare, and IoT
Manoharan
tries to intercept (Internet of Things)
(New Jersey
data, it will show up security.
Institute of
as an error.
Technology)
• E91 Protocol: Uses 3. However, challenges
pairs of entangled include high costs, the
particles (particles need for reliable
that are linked) to quantum particles
detect eavesdropping (qubits), and
because any infrastructure
interference breaks limitations.
the link, alerting the
users.

There are three • This method The paper is • Complexity of


methodologies used: shows that two theoretical and doesn’t Real-World
quantum states use actual data or Setup
• The paper suggests a are enough to experiments. It builds
Charles H. new way to create make secure on existing theories in • Photon
Bennett (IBM secure keys for keys. quantum cryptography Detection
Research communication using and uses examples to Issues
Division, T. J. two quantum states • The setup can explain the idea.
Watson instead of four. detect if
• Need for
Research • Light pulses are used someone is
Testing:
Center in a setup with trying to
mirrors and phase intercept the
shifters (called message because
interferometry) to any interference
generate and read will disturb the
key bits. quantum states.
1. The paper looks at how • Quantum The paper uses ideas 1. Expensive and
quantum cryptography cryptography is from other research but Complex: Quantum
can make network safer than doesn’t use specific data cryptography needs
security stronger. traditional or experiments. It relies costly equipment,
2. It focuses on quantum security methods. on existing knowledge making it hard for
1. Sanjaikanth E key distribution (QKD), • With QKD, only about quantum smaller businesses to
Vadakkethil which uses tiny the intended cryptography. use.
Somanathan quantum particles to users can access
Pillai (University share keys that unlock the secure key, 2. Short Range: It
of North secure communication. making it hard for works best over short
Dakota) 3. It explains that anyone to hack or distances, so using it
quantum particles listen in. for long-range
2. Kiran change if someone tries • It is especially communication is
Polimetla to intercept them, useful for still a challenge.
(Adobe Inc.) which helps detect protecting
eavesdroppers. important data, 3. Lack of
like government Standards: There
or financial aren’t set rules for
information.
using quantum
systems, so it’s tough
to connect them with
current technology
and make them
widely available.
• Quantum Key Sharing The authors show that: The paper is based on The authors note a few
(BB84 Protocol) - This • Quantum key theories and principles challenges that need
method uses quantum sharing can keep a from quantum physics. It more research:
1.Charles H. physics to let two code secure, even doesn’t use any specific • Fragile
Bennett (IBM people (often called over an insecure data but explains the Quantum
Research, USA) Alice and Bob) share a channel (one that methods with math and Signals
2. Gilles secret code securely. If could be quantum mechanics • No Digital
Brassard someone tries to listen eavesdropped). concepts. Signatures.
(University of in, they’ll disturb the • Quantum coin
Montreal, transmission, which tossing is secure
Canada) will be detected. and fair, so neither
• Quantum Coin Tossing person can cheat
- This method lets two without the other
people far apart agree noticing.
on a fair, random
outcome (like a coin
flip) without either
person being able to
cheat. It’s fair, even if
one person has strong
computer power.
Shalini Dhar, The paper suggests a new The proposed system No specific external data The study highlights
Ashish Khare, security system for IoT devices shows strong resistance to or dataset was used areas that need further
Ashutosh Dhar using blockchain and quantum common IoT security since the study is based work, such as
Dwivedi, and cryptography. Key parts of this threats, including on a model and improving system
Rajani Singh. approach include Quantum Key eavesdropping and data simulations of the scalability, making IoT
Distribution (QKD) to secure manipulation. By proposed security devices more energy-
data exchange, ASCON combining quantum approach. efficient, and preparing
encryption for lightweight cryptography and for future quantum
security, Zero-Knowledge blockchain, it offers a computing threats that
Proofs (ZKP) for privacy, and robust solution that works could weaken current
blockchain to ensure data well for devices with encryption methods.
integrity by storing data hashes. limited processing power.
This setup aims to address
issues like data tampering and
unauthorized access.

Tao Liu, Gowri The authors reviewed recent The review found that PQC This paper is a review The authors highlight
Ramachandran, research on Post-Quantum could be used to secure based on other studies the need for more
and Raja Jurdak Cryptography (PQC) to see how some IoT devices, but the and didn’t use any research to create
it performs and can be available improvements specific dataset. The standard PQC
improved for use with Internet aren’t standardized, authors gathered improvements that can
of Things (IoT) devices. They making it hard to use information from various work efficiently on
looked at different PQC these methods across academic sources different types of IoT
methods and evaluated how different devices. The focused on PQC and IoT. devices. They
well they could work for small, authors noted that PQC recommend focusing
low-power IoT devices that offers strong protection on making PQC
have limited computing power but can still be too methods simpler and
and memory. demanding for smaller IoT more efficient for
devices. widespread use in IoT
security.
Jakub Sowa, The authors created a network The results showed that Data was collected from The study highlights a
Bach Hoang, tool to measure how much very few systems are using network logs at the need for more research
Advaith Yeluru, Post-Quantum Cryptography PQC. For instance, only National Center for and standardization to
Steven Qie, (PQC) is used. This tool was set 0.029% of SSH Supercomputing make PQC widely
Anita Nikolich, up at a major supercomputing connections used PQC in Applications (NCSA) usable and consistent
Ravishankar Iyer, center and linked to the FABRIC OpenSSH, and a small between January 2023 across different devices
and Phuong Cao. testbed network. The study number of large networks and April 2024. and protocols. Future
looked at how well PQC is being in the U.S. and Europe Approximately 13 TB of work is recommended
adopted by different protocols have started using it. data was gathered from to improve adoption
(like SSH and TLS) and checked Adoption is increasing different network and address the
if any popular applications, slowly, but many protocols protocols like SSH and challenges of
such as Google Chrome and still lack PQC support. TLS, tracking PQC usage. integrating PQC into
OpenSSH, have implemented various network
PQC. protocols.

Alex The authors studied the The main result is a proof No specific dataset is The authors identified
Lombardi problem of unitary synthesis of a one-query lower used. The study is a lack of understanding
(how to implement any bound for unitary theoretical, relying on about the number of
(Princeton quantum operation efficiently) synthesis. This means they mathematical queries required to
University), and aimed to show that this demonstrated that some formulations and existing synthesize general
Fermi Ma cannot be achieved with only quantum transformations theoretical frameworks unitaries efficiently.
(Simons one query to an oracle. They cannot be created (even in quantum complexity
Institute for developed a framework using a approximately) with just and cryptography.
the Theory "challenger-adversary" game to one query to an oracle
of analyze the difficulty of this function. This finding
Computing, problem. Additionally, they suggests that secure
UC employed techniques from quantum cryptographic
Berkeley), random matrix theory to systems can withstand
John Wright explore the limits of single- attacks by one-query
(University query quantum algorithms in algorithms, even if these
of California, synthesizing unitaries and algorithms are powerful in
Berkeley) breaking cryptographic other contexts.
systems.
Bharat S. Rawal The authors conducted a The survey highlights that No specific experimental The authors identified
(Grambling State comprehensive survey of post- PQC methods like Crystals- dataset was used in this that while PQC shows
University) quantum cryptography (PQC) Dilithium and Kyber are survey. The authors potential, it is still in
Anjan Biswas by reviewing recent promising candidates for based their findings on a early stages for
(Grambling State advancements, challenges, and future encryption and review of existing mainstream adoption.
University, King implications of various signature needs. These literature and previously They note the need for
Abdulaziz cryptographic methods. They methods show high conducted studies in the further research in
University, focused on lattice-based resistance to quantum field of cryptography. standardizing PQC
Dunarea de Jos cryptography and other attacks due to their algorithms and
University of methods like hash-based, code- reliance on complex addressing
Galati, Sefako based algebraic problems that compatibility with
Makgatho quantum computers current systems.
Health Sciences struggle to solve
University) efficiently.
Petar Radanliev The study employs a qualitative The study found that Data sources include The study highlights
research approach within an integrating AI with standards and guidelines the need for further
interpretive paradigm. It quantum cryptography from institutions like research on
involves gathering data from holds great promise for NIST (National Institute overcoming technical
industry standards, case enhancing digital security of Standards and challenges in AI and
studies, and scholarly literature, against emerging threats. Technology), as well as quantum cryptography
followed by thematic analysis AI can help improve case studies and integration, particularly
to identify patterns and themes quantum cryptographic scholarly articles on in terms of real-time
related to AI and quantum processes, making them quantum computing, AI, applications and
cryptography integration. more efficient and robust. and cybersecurity. addressing the
However, challenges quantum threat to
remain in scalability, existing cryptographic
latency, and regulatory methods.
compliance.
Ritik Bavdekar, This study provides a review of The study highlights The research uses data There is a need for
Eashan Jayant current cryptographic methods several promising from the NIST post- more research in
Chopde, Ankit and potential post-quantum cryptographic approaches, quantum cryptography developing lightweight
Agrawal, algorithms. It analyzes the like lattice-based, code- standardization process, and efficient PQC
vulnerabilities of traditional based, hash-based, and which has reviewed algorithms, especially
Ashutosh Bhatia, cryptosystems when faced with multivariate cryptography, multiple algorithms to for IoT devices, as
Kamlesh Tiwari quantum computing and which are seen as more find quantum-resistant these algorithms need
examines post-quantum resistant to quantum cryptographic standards. to be secure yet
cryptography (PQC) options, attacks. It identifies compatible with low-
comparing the performance of finalists from the NIST power hardware.
different PQC algorithms on standardization process, Further analysis is also
various platforms. comparing them in terms needed to ensure that
of speed, security level, these algorithms can
and practical usage. withstand future
advancements in
quantum technology.
Yi-Kai Liu and This paper reviews the status of The study emphasizes the Data sources include The research identifies
Dustin Moody post-quantum cryptography need for new prior studies on PQC gaps in deploying PQC
(PQC), discussing its role in cryptographic methods algorithms and protocols across systems and the
securing the Internet against that resist quantum from organizations like need for more secure,
future quantum computer threats and highlights NIST, which are working cost-effective quantum
threats. It analyzes the recent developments in to standardize quantum- technology for practical
limitations of current PQC. It also discusses resistant encryption use. Additionally, there
cryptography with respect to experimental quantum methods. is a need for improved
quantum attacks and considers technologies that may quantum devices that
potential quantum secure cryptographic can provide
technologies to enhance hardware, like device- uncloneable, secure
cybersecurity, such as quantum independent random cryptographic keys and
key distribution and verification number generators and ensure the integrity of
techniques. uncloneable encryption quantum
computations.
Vatsal Vasani, The authors use a literature The paper highlights the The paper primarily The paper identifies
Kumar Prateek, review and analysis potential of quantum relies on existing several research gaps
Ruhul Amin, methodology to explore the technology to research papers, articles, in the field of quantum
Soumyadev field of quantum revolutionize and reports on quantum communication and
Maity communication and communication security technology, cryptography. Some of
cryptography. They delve into by offering unconditional communication, and these gaps include:
the fundamental principles, security. It explores cryptography. • Developing
potential applications, and various quantum practical and
future directions of this communication protocols, scalable
emerging field. including quantum key quantum
distribution, quantum communication
teleportation, and networks.
quantum-resistant • Improving the
cryptography. Additionally, security and
it discusses the potential efficiency of
applications of quantum. quantum key
distribution
protocols.
C. Bagath Basha, The study utilizes quantum Quantum cryptography The authors did not Current research on
K. Murugan, T. cryptography to enhance outperforms traditional specify a unique dataset symmetric and
Suresh, V. healthcare data security. The Advanced Encryption but simulated key homomorphic
Srirenga approach involves creating Standard (AES) encryption generation times using encryption highlights
Nachiyar, S. secure quantum states for data, in efficiency and security various bit sizes to assess performance issues,
Athimoolam, establishing quantum for healthcare data. For performance. especially in healthcare
and C. Kanmani entanglement between sender example, with a 150-bit applications. The paper
Pappa. and receiver, and using key, quantum identifies a gap in
Quantum Key Distribution cryptography’s encryption applying quantum-
(QKD) for encryption keys. A was completed in 352,237 resistant encryption
quantum simulator with milliseconds versus AES’s techniques to
Python’s Cirq library was used 310,285 milliseconds. This safeguard healthcare
to test this method's model shows enhanced data from emerging
effectiveness, measuring key speed and scalability over quantum computing
generation times across AES in key generation and threats, which the
different bit lengths. data encryption. authors suggest as an
area for future
research.
Vaishnavi • The paper explores Quantum cryptography is The paper primarily There is still a need to
Ganeshkar and quantum cryptography found to provide stronger reviews previous studies address practical
Mayura Kulkarni. to improve secure security than traditional on quantum challenges like the high
communication using methods, as it uses the cryptography and cost of implementing
the principles of physics of quantum doesn't rely on a specific quantum cryptography,
quantum mechanics, particles. This approach dataset. the need for
like quantum key can detect any specialized channels
distribution (QKD). It unauthorized access (like optical fibers), and
highlights two main attempts and is seen as a adapting existing
protocols, BB84 and more secure option for systems to use
E91, which help detect future communication quantum technologies.
any attempts to networks, especially with
intercept messages by the rise of quantum
creating secure computers that can break
cryptographic keys. traditional encryption.

Dr. G. S. This paper discusses PQC algorithms offer a The paper does not use Challenges include the
Mamatha, Rasha Post-Quantum promising solution to specific datasets but high computational
Sinha, and Cryptography (PQC), counteract quantum reviews existing cost and integration
Namya Dimri which is designed to threats, especially as they cryptographic techniques difficulties of PQC
from R.V. College protect digital are resistant to quantum and compares various algorithms with current
of Engineering, communication from attacks. For instance, PQC algorithms. systems.
Bengaluru, India. quantum computing lattice-based and code-
threats. It introduces based cryptography are
several PQC algorithms, found to be particularly
such as lattice-based, secure against quantum
code-based, hash- algorithms like Shor’s
based. algorithm.
AUTHOR NAME Methodology Result Source Research GAP

Quantum Cryptography 1.The new protocol achieves a


1.Christian Without Switching higher secret key rate It relies on existing Practical Implementations:
Weedbrook knowledge about quantum
2.Andrew M. Lance The methodology proposed 2.A feed-forward attack model cryptography. The protocol assumes idealised
3.Warwick P. Bowen in this coherent state QKD provides an upper bound, conditions like high channel
4.Thomas Symul protocol uses simultaneous helping gauge the protocol’s efficiency and large signal
5.Timothy C. quadrature measurements resistance to eavesdropping. LINK OF THE RESEACH variance, so testing under
to enhance the secret key PAPER: real-world conditions remains a
rate and bandwidth. By 3.The simultaneous quadrature gap.
calculating a lower bound measurement protocol boosts PAPER
for the secret key rate and bandwidth, enabling a higher
evaluating potential data rate.
eavesdropping through a
feed-forward attack model,
the study shows that, under
optimal conditions

two primary 1, The Quantum It relies on existing Lack of Advacements:


methodologies used in Random-Oracle Model provides knowledge about quantum
the research paper a more robust security definition cryptography. There aren’t set rules for using
Fang Song for cryptographic protocols. quantum systems, so it’s tough to
(University of 1.This approach adapts the connect them with current
Waterloo) traditional random-oracle 2.The Quantum Rewinding LINK OF THE RESEACH technology and make them
model for quantum Technique reveals that classical PAPER: widely available.
adversaries by allowing proof methods, like rewinding,
them to query a random may fail or require significant paper
function. modification

2.Quantum Rewinding: This


approach helps to counter
challenges in security
proofs against quantum
adversaries, the study
investigates limited use of
quantum rewinding
techniques.
Quantum key distribution RESULTS ARE GIVEN BELOW: It relies on existing 1.any attempt at interception
1,Anne Broadbent The methods used here knowledge about quantum disturbs the photon states,
2.Christian Schaffner are: 1.Both BB84 and E91 protocols cryptography. causing detectable errors.
can detect eavesdropping
effectively. 2. Designed to protech basic
BB84 Protocol: This LINK OF THE RESEACH quantum attacks any complex
protocol involves sending 2.Both protocols successfully PAPER: attack may not be proteched.
quantum bits (qubits) using generate secure encryption
polarized photons. keys. paper 3. Lack of practical
E91 Protocol: this method implementations.
uses pairs of entangled 3. Protocol Efficiency and
Resistance to Attacks: With high
particles to securely
channel efficiency, BB84
transmit information. Any achieves a stable key
eavesdropping attempt distribution rate.
breaks the entanglement
and gives a alert to the
communication party.
Author’s Methodology Results Source/Dataset Research
Name Gap
1.Aditya Jami The study focuses The research This paper relies on The study
2.Shankar Rao on theore cal shows that theore cal iden fies a need
Piriya. analysis and the quantum founda ons and for enhanced
(undergraduate implementa on cryptography has exis ng protocols of hardware and
students in of quantum significant quantum technology to
Computer cryptography, advantages over cryptography, such extend
Science specifically using classical as the BB84 transmission
Engineering at Quantum Key cryptographic protocol, rather distances for
Andhra Distribu on methods, than a specific prac cal
University) (QKD). The including dataset. quantum
authors explain resistance to cryptography
quantum computa onal deployment. It
cryptography’s advancements also highlights
reliance on and superior the requirement
quantum confiden ality. for robust
mechanics However, quantum
principles, like the limita ons in networks that
Heisenberg transmission can handle long-
Uncertainty distances and distance key
Principle, to the need for distribu on
secure data. An more robust securely and
example of the hardware and efficiently.
QKD process networks for
involving a widespread
sender, receiver, deployment are
and eavesdropper also noted.
is discussed,
demonstra ng
how photon
polariza on and
randomness in
quantum
mechanics thwart
unauthorized
access.
Maneesh Ya The study The study No specific dataset The research
(Deakin explores quantum demonstrates is provided; the iden fies a need
University) cryptography's QKD’s efficacy in research relies on for overcoming
theore cal basis providing secure theore cal concepts technical
and communica on. in quantum challenges in
implementa on, Simula on cryptography and quantum
focusing on the results showed simula ons compu ng
BB84 quantum that QKD conducted on IBM's hardware,
key distribu on successfully Qiskit pla orm. especially issues
(QKD) protocol. detects like decoherence
The methodology eavesdropping, and hardware
includes a review ensuring that complexity that
of quantum keys shared hinder QKD's
mechanics between par es prac cal
principles, such as are secure. The deployment. The
Heisenberg's author also study calls for
Uncertainty highlights QKD’s advancements in
Principle, and robustness quantum
photon against poten al infrastructure to
polariza on, intercep on or make QKD more
which underpin interference accessible and
quantum during data scalable.
cryptography. It transmission
further examines
QKD simula on
using IBM's Qiskit
for real-world
valida on
1.Chip Ellio , This research The network, The study u lizes The study
2.Dr. David involves the opera onal since data from real- me iden fies a need
Pearson, construc on and December 2002, opera ons and for improved
3. Dr. Gregory opera on of the has tes ng within the QKD
Troxel (BBN DARPA Quantum demonstrated DARPA Quantum transmission
Technologies) Network, the capability to Network, supported distance, higher
designed to secure VPN by DARPA funding. bit rates, and
secure connec ons in No external datasets scalable network
communica ons metro-sized were used, as the architecture. It
through Quantum areas using QKD. focus is on also calls for
Key Distribu on Results indicate prototype tes ng more robust
(QKD). The that the network and QKD hardware
methodology can successfully performance solu ons and
includes building detect evalua on. advancements in
a high-speed eavesdropping QKD relay or
quantum network a empts by repeater
prototype, measuring technology to
integra ng QKD quantum extend network
with IPsec, and disturbances, reach and
tes ng the though enhance security
network against scalability .
various remains
eavesdropping challenging.
methods. The Limita ons
study relies on include the
weak-coherent physical
quantum robustness of
cryptography QKD over longer
protocols and the distances and
unique physical the need for
layer of QKD, addi onal
leveraging op cal infrastructure
fibers for secure
data transmission
The authors performed a Quantum The paper references Scalability and Prac cal
Aakash Goyal, compara ve review of classical cryptography was seminal works and Implementa on: The
Sapna Aggarwal, and quantum cryptography. found to offer experiments in paper points out that
Aanchal Jain Key classical methods reviewed superior security due cryptography and quantum cryptography
included DES (Data Encryp on to quantum quantum mechanics, requires significant
Standard), Public Key mechanics principles, including: development to achieve
Cryptographic Systems, and which detect The founda onal BB84 widespread, scalable
One-Time Pad cryptosystems. eavesdropping protocol by Charles H. usage due to its high cost
Quantum cryptography a empts. Benne and Gilles and limited infrastructure
methods were examined with Classical Brassard. compa bility.
a focus on the BB84 protocol, cryptography, Research by Claude Transmission Distance:
which is based on quantum however, is more Shannon, Whi ield Quantum cryptographic
mechanics principles such as widely implemented, Diffie, Mar n Hellman, methods currently
Heisenberg’s uncertainty cost-effec ve, and and others on classical support only short-
principle and the no-cloning offers high bit rates cryptographic methods. distance communica on,
theorem. suitable for long- Experimental findings whereas classical methods
distance by Chinese scien sts on can cover vast distances
communica on. quantum
communica on
distances and Toshiba’s
record bit rate
achievements for
quantum key
distribu on
H. Zbinden, H. The authors begin by The research The ar cle references The study iden fies the
Bechmann- explaining the BB84 quantum demonstrates that founda onal works in need for further
Pasquinucci, N. key distribu on protocol. In their interferometric quantum cryptography, development in photon
Gisin, and G. this protocol, Alice and Bob setup using Faraday including Benne and counters, as current
Ribordy from the exchange informa on through mirrors is effec ve in Brassard's 1984 BB84 technology limits the
University of a quantum channel (usually crea ng a stable key protocol, as well as transmission distance of
Geneva op cal fibers) and use distribu on system, various studies on secure quantum
polarized photons to create a achieving high fringe photon detectors, communica on to under
secure cryptographic key. visibility (99.8%) over interferometry, and 100 km.
They implemented two a 23 km telecom link quantum cryptography The authors suggest that
experimental setups for with a 1.35% experiments. improving photon
quantum cryptography: one quantum bit error It also cites detectors could
based on polariza on coding rate (QBER). advancements in significantly extend
and another using an They calculated the experimental setups transmission distances,
interferometric approach with prac cal limits of and theore cal analyses poten ally up to 92 km or
Faraday mirrors, which helps their quantum of cryptographic more with op mized
maintain stable polariza on cryptography setup, protocols, discussing detectors, and
over long distances without es ma ng maximum alterna ve methods for hypothesize that satellite-
manual alignment. distances of about 70 photon detec on and based quantum
km at bit rates of 100 error correc on. communica on could one
Hz with current day enable global secure
technology, primarily communica on.
constrained.

You might also like