Quantum Cryptography: The world's superpowers are engaged in a race to develop quantum weapons, which would fundamentally alter the nature of conflict

· Emerging Technologies in Information and Communications Technology Book 21 · One Billion Knowledgeable
4.3
3 reviews
Ebook
320
Pages
Eligible
Ratings and reviews aren’t verified  Learn More

About this ebook

What Is Quantum Cryptography

Utilizing quantum mechanical features in order to carry out cryptographic operations is the field of study known as quantum cryptography. The most well-known application of quantum cryptography is quantum key distribution, which provides a safe, from an information theory standpoint, solution to the issue of key exchange. The benefit of quantum cryptography lies in the fact that it enables the successful completion of a variety of cryptographic tasks that have been demonstrated or conjectured to be impossible using only classical communication. These tasks include decrypting messages that have been encrypted using a key that has been stolen. It is not feasible, for instance, to duplicate data that has been encoded in a quantum state. If someone makes an effort to read the encoded data, the quantum state will be altered as a result of the collapse of the wave function. In quantum key distribution, this may be used to identify eavesdropping on conversations (QKD).


How You Will Benefit


(I) Insights, and validations about the following topics:


Chapter 1: Quantum cryptography


Chapter 2: Quantum teleportation


Chapter 3: Quantum entanglement


Chapter 4: Quantum key distribution


Chapter 5: Quantum network


Chapter 6: John Rarity


Chapter 7: BB84


Chapter 8: Time-bin encoding


Chapter 9: Quantum cloning


Chapter 10: Quantum nonlocality


Chapter 11: One-way quantum computer


Chapter 12: SARG04


Chapter 13: Noisy-storage model


Chapter 14: Decoy state


Chapter 15: Nicolas J. Cerf


Chapter 16: Dynamical decoupling


Chapter 17: Device-independent quantum cryptography


Chapter 18: Six-state protocol


Chapter 19: Continuous-variable quantum information


Chapter 20: Relativistic quantum cryptography


Chapter 21: Adrian Kent


(II) Answering the public top questions about quantum cryptography.


(III) Real world examples for the usage of quantum cryptography in many fields.


(IV) 17 appendices to explain, briefly, 266 emerging technologies in each industry to have 360-degree full understanding of quantum cryptography' technologies.


Who This Book Is For


Professionals, undergraduate and graduate students, enthusiasts, hobbyists, and those who want to go beyond basic knowledge or information for any kind of quantum cryptography.

Ratings and reviews

4.3
3 reviews
Anil Das
August 25, 2024
AAA
Did you find this helpful?
Anil Das
October 26, 2022
AAA BOSS NETWORK
Did you find this helpful?

About the author

Fouad Sabry is the former Regional Head of Business Development for Applications at HP. Fouad has received his B.Sc. of Computer Systems and Automatic Control in 1996, dual master’s degrees from University of Melbourne (UoM) in Australia, Master of Business Administration (MBA) in 2008, and Master of Management in Information Technology (MMIT) in 2010. Fouad has more than 20 years of experience in Information Technology and Telecommunications fields, working in local, regional, and international companies, such as Vodafone and IBM. Fouad joined HP in 2013 and helped develop the software business in tens of markets. Currently, Fouad is an entrepreneur, author, futurist, focused on Emerging Technologies, and Industry Solutions, and founder of One Billion Knowledgeable (1BK) Initiative.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.

Continue the series

More by Fouad Sabry

Similar ebooks