THE RISE OF QUANTUM CRYPTOGRAPHY: A GAME-CHANGER FOR DATA SECURITY

Main Article Content

Аннотация:

Quantum cryptography leverages the principles of quantum mechanics to achieve unprecedented levels of data security. This paper examines the theoretical foundations, key algorithms, and real-world applications of quantum cryptography, with a focus on Quantum Key Distribution (QKD). Key algorithms like BB84 and E91 are analyzed, with mathematical formulations provided to illustrate their security properties. Challenges, including scalability and side-channel vulnerabilities, are also addressed. The study concludes that while quantum cryptography is still evolving, its potential to secure communication against quantum and classical threats makes it a critical area for research and deployment.

Article Details

Как цитировать:

Jumaev , G. ., Abdiraimova , Z. ., & Mamarajabov, H. . (2025). THE RISE OF QUANTUM CRYPTOGRAPHY: A GAME-CHANGER FOR DATA SECURITY. Евразийский журнал академических исследований, 4(12 Special Issue), 998–1002. извлечено от https://in-academy.uz/index.php/ejar/article/view/45834

Библиографические ссылки:

Jumaev G., Normuminov A., Primbetov A. 2023 Vol. 6 No. 4 (2023): JOURNAL OF MULTIDISCIPLINARY BULLETIN SAFEGUARDING THE DIGITAL FRONTIER: EXPLORING MODERN CYBERSECURITY METHODS | JOURNAL OF MULTIDISCIPLINARY BULLETIN (sirpublishers.org) https://sirpublishers.org/index.php/jomb/article/view/156

Jumaev Giyosjon, ―Proceedings of the 11th International Conference on Applied Innovations in IT‖ XALQARO ILMIY JURNALI. ENHANCING ORGANIZATIONAL CYBERSECURITY THROUGH ARTIFICIAL INTELLIGENCE https://doi.org/10.5281/zenodo.10471793

Mamadjanov Doniyor, Jumaev Giyosjon, Normuminov Anvarjon INNOVATION IN THE MODERN EDUCATION SYSTEM: a collection scientific works of the International scientific conference (25th January, 2024) – Washington, USA: "CESS", 2024. Part 37 – 368 p. THE ROLE OF MACHINE LEARNING IN CREDIT RISK ASSESSMENT:EMPOWERING LENDING DECISIONS

Mamadjanov Doniyor, Jumaev Giyosjon, Normuminov Anvarjon INNOVATION IN THE MODERN EDUCATION SYSTEM: a collection scientific works of the International scientific conference (25th January, 2024) – Washington, USA: "CESS", 2024. Part 37 – 368 p. THE ROLE OF CLOUD COMPUTING IN ECONOMIC TRANSFORMATION

Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179.

Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663.

Shor, P. W. (1994). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 124–134.

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145–195.

Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dusek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350.

Yin, J., Cao, Y., Li, Y. H., et al. (2017). Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140–1144.

Lo, H.-K., Curty, M., & Tamaki, K. (2014). Secure quantum key distribution. Nature Photonics, 8, 595–604.

Pirandola, S., Andersen, U. L., Banchi, L., et al. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.

Lütkenhaus, N., & Shields, A. J. (2007). Focus on quantum cryptography: Theory and practice. New Journal of Physics, 11, 045005.

Renner, R. (2008). Security of quantum key distribution. International Journal of Quantum Information, 6(1), 1–127.

Briegel, H. J., Dur, W., Cirac, J. I., & Zoller, P. (1998). Quantum repeaters: The role of imperfect local operations in quantum communication. Physical Review Letters, 81(26), 5932–5935.

Xu, F., Ma, X., Zhang, Q., et al. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.

Rieffel, E. G., & Polak, W. H. (2011). Quantum Computing: A Gentle Introduction. MIT Press.

Wiesner, S. (1983). Conjugate coding. ACM SIGACT News, 15(1), 78–88.

Korzh, B., Lim, C. C. W., Houlmann, R., et al. (2015). Provably secure and practical quantum key distribution over 307 km of optical fiber. Nature Photonics, 9, 163–168.

Bennett, C. H., Brassard, G., & Mermin, N. D. (1992). Quantum cryptography without Bell’s theorem. Physical Review Letters, 68(5), 557–559.

Acín, A., Brunner, N., Gisin, N., et al. (2007). Device-independent security of quantum cryptography against collective attacks. Physical Review Letters, 98(23), 230501.

Scarani, V., Gisin, N., & Zbinden, H. (2004). Quantum key distribution protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92(5), 057901.

Bacco, D., Canale, M., Laurenti, N., et al. (2019). Experimental quantum key distribution with finite-key security analysis for noisy channels. Nature Communications, 10, 3004.

Zou, X., Qiu, D., Li, L., et al. (2015). Quantum cryptography based on entangled photon pairs. Physical Review A, 91(5), 052340.

Наиболее читаемые статьи этого автора (авторов)

1 2 > >>