161,841 research outputs found
Cryptography: Mathematical Advancements on Cyber Security
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information. Eventually, the realm of cryptography grew to include the concealment of more important information, and cryptography quickly became the backbone of cyber security. Many companies today use encryption to protect online data, and the government even uses encryption to conceal confidential information. Mathematics played a huge role in advancing the methods of cryptography. By looking at the math behind the most basic methods to the newest methods of cryptography, one can learn how cryptography has advanced and will continue to advance
Quantum Cryptography
Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature. In this
paper we shall describe the theory of quantum cryptography, its potential
relevance and the development of a prototype system at Los Alamos, which
utilises the phenomenon of single-photon interference to perform quantum
cryptography over an optical fiber communications link.Comment: 36 pages in compressed PostScript format, 10 PostScript figures
compressed tar fil
Quantum Cryptography
Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic
Free-Space Quantum Key Distribution
Based on the firm laws of physics rather than unproven foundations of
mathematical complexity, quantum cryptography provides a radically different
solution for encryption and promises unconditional security. Quantum
cryptography systems are typically built between two nodes connected to each
other through fiber optic. This chapter focuses on quantum cryptography systems
operating over free-space optical channels as a cost-effective and license-free
alternative to fiber optic counterparts. It provides an overview of the
different parts of an experimental free-space quantum communication link
developed in the Spanish National Research Council (Madrid, Spain).Comment: 22 pages, 15 figure
Efficient Unified Arithmetic for Hardware Cryptography
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1], the US federal Digital Signature Standard [2], elliptic curve cryptography [3, 4], and also recently identity based cryptography [5, 6]. Most popular finite fields that are heavily used in cryptographic applications due to elliptic curve based schemes are prime fields GF(p) and binary extension fields GF(2n). Recently, identity based cryptography based on pairing operations defined over elliptic curve points has stimulated a significant level of interest in the arithmetic of ternary extension fields, GF(3^n)
- …
