What Is Quantum Cryptography
Utilizing quantum mechanical features in order to carry out cryptographic operations is the field of study known as quantum cryptography. The most well-known application of quantum cryptography is quantum key distribution, which provides a safe, from an information theory standpoint, solution to the issue of key exchange. The benefit of quantum cryptography lies in the fact that it enables the successful completion of a variety of cryptographic tasks that have been demonstrated or conjectured to be impossible using only classical communication. These tasks include decrypting messages that have been encrypted using a key that has been stolen. It is not feasible, for instance, to duplicate data that has been encoded in a quantum state. If someone makes an effort to read the encoded data, the quantum state will be altered as a result of the collapse of the wave function. In quantum key distribution, this may be used to identify eavesdropping on conversations (QKD).
How You Will Benefit
(I) Insights, and validations about the following topics:
Chapter 1: Quantum cryptography
Chapter 2: Quantum teleportation
Chapter 3: Quantum entanglement
Chapter 4: Quantum key distribution
Chapter 5: Quantum network
Chapter 6: John Rarity
Chapter 7: BB84
Chapter 8: Time-bin encoding
Chapter 9: Quantum cloning
Chapter 10: Quantum nonlocality
Chapter 11: One-way quantum computer
Chapter 12: SARG04
Chapter 13: Noisy-storage model
Chapter 14: Decoy state
Chapter 15: Nicolas J. Cerf
Chapter 16: Dynamical decoupling
Chapter 17: Device-independent quantum cryptography
Chapter 18: Six-state protocol
Chapter 19: Continuous-variable quantum information
Chapter 20: Relativistic quantum cryptography
Chapter 21: Adrian Kent
(II) Answering the public top questions about quantum cryptography.
(III) Real world examples for the usage of quantum cryptography in many fields.
(IV) 17 appendices to explain, briefly, 266 emerging technologies in each industry to have 360-degree full understanding of quantum cryptography' technologies.
Who This Book Is For
Professionals, undergraduate and graduate students, enthusiasts, hobbyists, and those who want to go beyond basic knowledge or information for any kind of quantum cryptography.
Fouad Sabry is the former Regional Head of Business Development for Applications at HP in Southern Europe, Middle East, and Africa (SEMEA). Fouad has received his B.Sc. of Computer Systems and Automatic Control in 1996, dual masterâs degrees from University of Melbourne (UoM) in Australia, Master of Business Administration (MBA) in 2008, and Master of Management in Information Technology (MMIT) in 2010.
Fouad has more than 20 years of experience in Information Technology and Telecommunications fields, working in local, regional, and international companies, such as Vodafone and IBM in Middle East and Africa (MEA) region. Fouad joined HP Middle East (ME), based in Dubai, United Arab Emirates (UAE) in 2013 and helped develop the software business in tens of markets across Southern Europe, Middle East, and Africa (SEMEA) regions. Currently, Fouad is an entrepreneur, author, futurist, focused on Emerging Technologies, and Industry Solutions, and founder of One Billion Knowledgeable (1BK) Initiative.