Quantum Key Distribution by Exploitation Public Key Cryptography (ECC) in Resource Constrained Devices

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
Quantum cryptography uses the laws of quantum physics for communication, offers an unconditionally secure solution to the key distribution problem. Moreover quantum mechanics also provides the ability to detect the presence of eavesdropper who is trying to learn key. But there is a problem of user authentication in quantum cryptography which can be overcome by using advantages of both public and quantum cryptography. By using ECC (Elliptic Curve Cryptography), which provides equivalent security level as RSA (Rivest-Shamir-Adleman) in less key size that is 160-bit key size of ECC provides equivalent security level as 1024-bit key size of RSA which is advantageous for resource constrained devices like cellular phone, Personal Digital Assistants (PDAs), embedded systems, sensors and smart cards.
Download Now

Find By Topic