Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Quantum Cryptography Protocols for Information Security

Quantum Cryptography Protocols for Information Security
View Sample PDF
Author(s): Göran Pulkkis (Arcada Polytechnic, Finland)and Kaj J. Grahn (Arcada Polytechnic, Finland)
Copyright: 2009
Pages: 8
Source title: Encyclopedia of Information Science and Technology, Second Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-60566-026-4.ch510


View Quantum Cryptography Protocols for Information Security on the publisher's website for pricing and purchasing information.


Quantum cryptography will have a severe impact on information security technology. The objective of this article is to present state-of-the-art and future possibilities of two quantum cryptography protocol types. These protocols are for absolutely secure distribution of symmetric encryption/ decryption keys and for creating secure digital signatures.

Related Content

Christine Kosmopoulos. © 2022. 22 pages.
Melkamu Beyene, Solomon Mekonnen Tekle, Daniel Gelaw Alemneh. © 2022. 21 pages.
Rajkumari Sofia Devi, Ch. Ibohal Singh. © 2022. 21 pages.
Ida Fajar Priyanto. © 2022. 16 pages.
Murtala Ismail Adakawa. © 2022. 27 pages.
Shimelis Getu Assefa. © 2022. 17 pages.
Angela Y. Ford, Daniel Gelaw Alemneh. © 2022. 22 pages.
Body Bottom