2010
DOI: 10.3846/aviation.2010.10
|View full text |Cite
|
Sign up to set email alerts
|

Modern Quantum Technologies of Information Security Against Cyber‐terrorist Attacks

Abstract: Abstract. In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 53 publications
0
21
0
Order By: Relevance
“…It uses a concept of qubits. Simply put, information security can be based on this quantum technology and the quantum secure direct communication (QSDC) and storage (Korchenko et al , 2011). It focusses on quantum key distribution which uses two different protocols i.e.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…It uses a concept of qubits. Simply put, information security can be based on this quantum technology and the quantum secure direct communication (QSDC) and storage (Korchenko et al , 2011). It focusses on quantum key distribution which uses two different protocols i.e.…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…There are two major classes of methods to replace traditional cryptographythe first one is quantum cryptography (QC) [1], based on the fundamental difference, the use of the unique capabilities of quantum mechanics; the second is post-quantum cryptography (PQC) [2], based on the more complicated mathematical problems (for example, lattice-based cryptosystems, syndrome-based cryptosystems and others).…”
Section: Introductionmentioning
confidence: 99%
“…A method of quantum secure direct communication (QSDC), contrary to quantum key distribution (QKD) schemes, offers the confidential exchange of deterministic messages without key agreement [12]. The interest in this fascinating idea started a decade ago in seminal papers of Beige et.al.…”
Section: Introductionmentioning
confidence: 99%