QC 00
QC 00
Cryptography
Abstract. Data secrecy concern has always beenand still is a crucial matter for
supper secret information. The transport of this kind of information was, in the
early ages, done by a trustworthy prophet to accomplish the process. It was either
to alert or for safety reasons. The same cycle still existed within or even between
many different countries. Which prepared the right causes to improve the cryp-
tography field. Lately, many industries have included secrecy settings to protect
user’s private information and have contributed to promoting it. First, it started
with transposition and shifting the message’s letter in a direction, then it jumped
to a cryptosystem founded on mathematical equations, especially the complex and
the computational-power consumer. Although, it worked for decades. However,
quantum mechanics has altered this belief and the dependency on classical and
modern cryptography. Quantum physics’ properties have given an unpredictable
opportunity to achieve both the full confidentiality and reliability of quantum
encryption. An example of the BB84 protocol, which was proposed in 1984 by
Bernhard and Bennett, the Quantum Secret Sharing (QSS) in early 2000, the
Twin-Field Quantum Key Distribution (TF-QKD) in late 2010, and more. Those
protocols have proved the predictability of supposed eavesdropping, for some, by
calculating a certain QBER quantum bit error rate. The objectives of this article
are to state cryptography eras as well as the recent works done by researchers and
their contribution to the quantum field.
1 Introduction
With the revolution of technology that the world has known in the last decades, a new
pack of challenges and obstacles has been revealed, especially the ones that diverge the
growth of this wave of innovation and development. Many fields have promoted their
functionality, giving examples of fields such as public administration, transportation, and
higher education, in addition to new solutions, which there is eCommerce and eBusiness.
Although, the prime concern that follows is to ensure the integrity and protect the secrecy
of the information circulating on the internet.
2 Overview
2.1 Classical and Modern Cryptography
Security has always been the first concern in any particular matter and is of great impor-
tance, specifically for governmental matters in the digital world. Among the early meth-
ods of cryptographic techniques are Substitution and Transposition techniques. The first
technique substitutes the message’s letter, for which only to receiver has the appropriate
tool to decipher it. The famous methods are Ceaser Cipher, Monoalphabetic, Cipher,
Hill Cipher, and One-Time-Pad. Columnar transposition is an example of The Trans-
position technique [6, 7]. However, these techniques were very vulnerable. Researchers
have created using the existing resources and materials, new cryptosystems, in which the
complexity of some mathematical formula was the basic foundation, like the prime inte-
ger factorization. Much research has been dedicated to advancing cryptology to higher
levels of resistance [2, 8–10]. After creating a new cryptosystem, cryptologists often
announce substantial prizes for cryptanalysts during a specified period to examine and
Comparative Study: The Emerging of Quantum Cryptography 293
attempt to defeat the newly created cryptosystems. Only after successful evaluation and
adoption by the National Institute of Standards and Technology (NIST) does a cryptosys-
tem gain broader recognition. There are two broad cipher categories, symmetric-key and
public-key cryptography.
Symmetric-Key Ciphers. Only before the 1970s [11], did the predominant cryptosys-
tem employ private-key ciphers, also known as symmetric-key ciphers. As illustrated
in Fig. 1.a, both the sender (referred it as Alice) and the recipient (referred it as Bob)
share the same secret key for encrypting and decrypting messages. The mutual posses-
sion of this key forces the need to secure the communication channel transmitting the
secret key from any outer abuse (referred to as Eve). However, the challenge arises in
securely exchanging this initial key. The schema below clarifies the flow of the Private
Key Encryption.
Public-Key Ciphers and the Advent of Asymmetric. The limitations of symmetric-
key cryptography led to the development of public-key cryptography and digital sig-
natures, a paradigm shift in encryption methodologies. Unlike symmetric key systems,
public-key cryptography employs pairs of keys, the public key to encrypt for decryption,
is used as a private one, as explained in Fig. 1.b below. This innovative approach not
only addressed the key exchange challenge but also opened new avenues for securing
digital in this world.
(a)
(b)
Fig. 1. (a) Symmetric cipher, (b) Asymmetric cipher
294 C. Ehbali et al.
has two single-photon detectors to receive Alice’s polarized photon. Bob chooses ran-
domly two bases unknowing Alice’s chosen bases. After the conversion to the HV and
so at the random bit, the AD bases are used, Bob announces the bases he used. Only
after this step, that Alice says in which cases they both used the same bases to be kept,
otherwise, there is no other usage of the bit where different bases are used but thrown.
This process is called the key sifting, during which the key is reduced. Furthermore, the
value of QBER (quantum bit error rate) is calculated to ensure the eavesdropping during
the transmission. Table 1 below shows how the result of the key sent from Alice to Bob
and the measurement of the key [13–15].
Sequence + + + x x + x x
Result of Photon Detector 1 0 1 1 0 1 0 1
Comparison False Right Right False Right False False Right
Final Key – 1 1 – 1 – – 1
The key principles of quantum mechanics that quantum computing benefits from are
the superposition and the entanglement keys.
From one side, the superposition property allows quantum computers to process a
vast amount of information in parallel, enabling them to solve certain problems exponen-
tially faster than classical computers. The phenomena of entanglement, on the other side,
where qubits become correlated and the state of one qubit instantly influences the state
of another, regardless of the physical distance between them. Entanglement enhances
the computational power of quantum computers by coordinating among qubits and also
facilitating efficient communication, which proves the resistance against eavesdrop-
ping attacks. These characteristics allow quantum computers to perform calculations at
unprecedented speeds, promising advances in areas such as optimization, simulation,
and machine learning.
296 C. Ehbali et al.
Prime number bit length Font Maintain security until the year
2048 2040
3106 2065
4096 2085
5120 2103
6144 2116
system [10]. Instead, it relies on the quantum states of the photons or quantum states to
transmit information. Using quantum measurements, the transmitters can detect whether
the photons’ quantum states are being attacked during the transmission. Once the trans-
mitters confirm that they’ve received a maliciously transmitted key, they will either give
up the key or terminate the protocol. This type of key sharing can provide the theo-
retical absolute security of a quantum key distribution system. Several protocols have
been developed to achieve the QKD objectives, mainly BB84, E91, MDI-QKD, BQC,
and DI-QKD. The BB84 was first proposed by Bennett and Brassard, where the name
comes from. Its concept is that every bit of the key should be encoded into the polar-
ization state of a single photon, knowing that to measure that single photon it must be
destroyed, which leads to the certainty of a highly secure key distribution protocol to
prevent eavesdropping vulnerability, especially the active state. The E91 protocol uses
entangled photons, where the position of one photon immediately affects the position of
its counterpart, no matter how far away they are. This connection makes it more secure
against certain types of attacks. The main differences between some characteristics of
all the modern and quantum encryption are listed in the Table 4 below:
3 Literature Review
resistance against multiple threats. This article [8] proposes a new approach of using a
wireless network instead of a wired network using optical transmission to acquire the
quantum key to enhance the quantum identity authentication protocol, which is based on
both face recognition and optical transmission to ensure efficiency and safety in mobile
applications. It also mentions the use of quantum key distribution and the “one-time
pad” encryption scheme for ensuring security. The paper [9] has conducted a study
about the deployment of quantum keys in video conferencing. The research has, besides
the experiment, proposed a new quantum key expansion algorithm. This algorithm was
put forward based on the lower rate of the quantum key generation than the quantum
key encryption consumption. The experimental research has combined both a 3-node
quantum communication network and a classic network. The final result is the absolute
safety also security of communication during video data transmission and the image
quality was put into consideration during the encryption and decryption phase, which is
characterized by the one-time pad system. In the article [22], a framework is proposed
for enhanced cloud data security using the McEliece and NTRU cryptosystems. The
proposed model aims to decrease man-in-the-middle attacks and improve data secu-
rity in a ‘Post-Quantum Cryptography-driven security framework for cloud computing’.
Cryptosystems like RSA and ECC have provided security against classical attacks, but
the advent of quantum computing has revealed potential weaknesses.
4 Conclusion
The conversion to encrypted data includes some key-role features, essentially, confiden-
tiality, interoperability, key management, integrity, and non-repudiation. As technology
advances, cryptography is an ongoing study to adapt security norms. Virtual Private
Networks, online conversation, financial information, password storing, and copyright
management are just a few of the applications when cryptography is a must. The transi-
tion from classical to post-quantum cryptographic solutions brings both challenges and
opportunities. Standardization efforts, collaboration between academia and industry, and
continued research are also an important part. As we grapple with the complexities of
information security in the era of quantum progress, it is important to understand the sta-
tus of related work in post-quantum cryptography as it has the potential to break existing
cryptosystems. Continued exploration and collaboration within the scientific community
play a key role in shaping the future of cryptography. In this paper, we reviewed both
modern cryptography and quantum encryption. Stating the major areas of differences
and the advent of certain algorithms, protocols, and schemas. Putting forward the advan-
tage of the key-length increase fact, although it won’t last. The financial industry is, so
far, the main target of malicious attacks and will benefit a lot from this transition, and
this is what we look forward to in future work.
References
1. Tanwar, S.: Basics of Cryptographic Primitives for Blockchain Development. In: Blockchain
Technology: From Theory to Practice, pp. 83–111. Springer (2022)
2. Mardon, A., et al.: Cryptography (2021)
300 C. Ehbali et al.
3. Bajrić, S.: Enabling secure and trustworthy quantum networks: current state-of-the-art, key
challenges, and potential solutions. IEEE Access 11, 128801–128809 (2023)
4. Stenholm, S., Suominen, K.-A.: Quantum approach to informatics. John Wiley & Sons (2005)
5. Aerts, D., Sassoli de Bianchi, M.: The extended Bloch representation of quantum mechanics:
Explaining superposition, interference, and entanglement. J. Math. Phys. 57(12) (2016)
6. Poonia, P., Kantha, P.: Comparative study of various substitution and transposition encryption
techniques. Int. J. Comput. Appl. 145(10), 24–27 (2016)
7. Sharma, D.K., et al.: A review on various cryptographic techniques & algorithms. Mater.
Today Proc. 51, 104–109 (2022)
8. Zhu, D., et al.: A quantum identity authentication protocol based on optical transmission &
face recognition. Int. J. Online Eng. 14(4) (2018)
9. Zhu, D., et al.: Experimental research on application of quantum key in video conference
system. Int. J. Online Eng. 14(4) (2018)
10. Zhu, D., et al.: A quantum key-based mobile security payment scheme. Int. J. Performability
Eng. 15(8), 2165 (2019)
11. Klima, R.E., et al.: Cryptology: classical and modern. Chapman and Hall/CRC (2018)
12. Chen, L., et al.: Report on post-quantum cryptography, vol. 12. US Department of Commerce,
National Institute of Standards and Technology (2016)
13. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett.
68(21), 3121 (1992)
14. Al-Ghamdi, A.B., Al-Sulami, A., Aljahdali, A.O.: On the security and confidentiality of
quantum key distribution. Secur. Privacy 3(5), e111 (2020)
15. Bykovsky, A.Y., Kompanets, I.N.: Quantum cryptography and combined schemes of quantum
cryptography communication networks. Quantum Electron. 48(9), 777 (2018)
16. Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptol. 14, 255–293
(2001)
17. Lenstra, A.K.: Key lengths. Wiley (2006)
18. Barreto, P.S., et al.: Sharper ring-LWE signatures. Cryptology ePrint Archive (2016)
19. Nejatollahi, H., et al.: Post-quantum lattice-based cryptography implementations: a survey.
ACM Comput. Surv. (CSUR) 51(6), 1–41 (2019)
20. Kaur, M., Kalra, S.: Security in IoT-based smart grid through quantum key distribution. In:
Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 2.
Springer (2018)
21. Niu, X.-F., et al.: A third-party E-payment protocol based on quantum multi-proxy blind
signature. Int. J. Theor. Phys. 57, 2563–2573 (2018)
22. Ukwuoma, H.C., et al.: Post-quantum cryptography-driven security framework for cloud
computing. Open Comput. Sci. 12(1), 142–153 (2022)