Quantum Cryptography Discussion Chapter Name: Project Title: Instructor: Institution: Submission Date: Conclusion Quantum cryptography has been extensively used by many organisations because it usually offer the solution to the distribution problems that are presented by classical cryptography. This is mainly because the quantum computations involved in sending the data provides a succinctly secure way of transmitting messages or information from the sender to the receiver. However, the conventional cryptography techniques usually needs the settlement of a secret key prior to message exchange over a conventional channel (Bennett et al. 1992). Alternatively the quantum cryptography technique is more convenient since it is responsible of allowing both the senders and the receivers to embark on the generation of a secret key through transmission of specially prepared photons over a quantum channel (Bennett, 1992). Therefore, the secrecy is usually based on the fact that it is not possible for an eavesdropper to be able to observe the photons without disturbing their quantum-mechanical state. Hence, any attempt of eavesdropping is actually detected immediately (Timofeev et al. 2006). Moreover, various issues are always addressed prior to the usage of the quantum cryptography into the mainstream as well as becoming a crucial part of personal computing together with the security technology. In addition, currently the quantum cryptography requires large as well as custom built infrastructure in an environment that is very controlled thereby requiring complicated quantum logic circuits. However, despite the building of such facilities is not be economically feasible but offers greater advantage in terms of security which complements the involved initial cost of setting up the system (Lindergaard, 2000). Moreover, the quantum cryptography requires the availability of optimal temperature as well as the proper operation of the circuitry. Additionally, the other issue which is explicitly related to the technology is mainly that this program has to be run many times while the program’s output has to be analyzed in order to determine its the correct and exact value. Moreover, the other issue with the use of the quantum cryptography is that the use of repeaters is actually not possible. Also it is not possible to sent the secured messages for a distance that is over 70 km using this technique which is aided by the optical fibres and wireless networks. Therefore, the need of establishing a œquantum network becomes necessary since it would allow quantum cryptography to be able to cover cities and eventually the entire globe (Timofeev et al. 2006). However, this will undoubtedly need the putting in place the suitable channels for transmit messages over large distances. Hence, the ability of scaling up this technology for mass deployment for the next generation of computer remains to be seen, but very potential according to the already made developments (Bennett et al. 1992). In addition, quantum cryptography offers greater advantages that have been identified throughout the discussion of the project objectives and research questions. This is mainly because it usually provides the most secured way of communication between the two legitimate users without compromising the security of the messages, mainly because it stops unauthorized users to access the secured information without any compromise unlike the traditional cryptographic methods where the information can be decoded easily by third parties (Timofeev et al. 2006). Hence, any message transferred between users as part of the communication process cannot be decoded if the message is encoded by the key which is equal in length of the message which is only known to the legitimate users. However, despite the fact that this approach seems efficient the problem usually occurs in transferring the keys to remote users (Bennett, 1992). Also, the classical methods of cryptography are not able to transfer key secretly over the communication channels, hence this was the main reason the idea of quantum physics and informatics came in order to provide secured ways of transferring messages thereby enabling communication over a long range by secured key over the communication channel (Lindergaard, 2000). Moreover, the security usually achieved in communication through the application of the quantum cryptography technique is most effective due to the following two reasons: first, if quantum cryptographic methods are used it is impossible to eaves drop or intercept the information without both of the communicating parties knowing. Therefore, it is undoubtedly very hard to intercept the sent data without being detected by the two users who are communicating (Bennett et al. 1992). Secondly, it is highly impossible to predict the quantum key. Also, the fact of intervention between the legitimate users is usually established whenever any unauthorized user attempts to access the information, since it will cause changes in the objects quantum states, thereby leading to the immediate detection of these changes by the users. Therefore, the evaluation of the quantum cryptography in comparison with other conventional cryptography reveals that it is undoubtedly the most efficient and secure methods due the advantages it provides with the main one been the level security it offers to the communication channels and its urgency of reporting an interception (Bennett, 1992). Hence, the best solution for secured communication so far, which has enabled its extensive application in banks and military as well others institutions that transmit sensitive information (Timofeev et al. 2006). Reference List Bennett, C. 1992, Quantum Cryptography Using Any Two Non-orthogonal States. The American Physical Society: Physical Review Letters, vol. 68, no. 21, pp. 3121-3124. Bennett, C., Bessette, F., Brassard, G., Salvail, L., & Smolin, J. 1992, Experimental Quantum Cryptography. Journal of Cryptology, vol. 5, no.1, pp. 3-28. Lindergaard, D. 2000, An Introduction to Quantum Cryptography. New York: Blackwell. Timofeev, A., Pomozov, D., Makkaveev, A., & Molotkov, S. (2006). Public Classical Communication in Quantum Cryptography: Error Correction, Integrity, and Authentication. Journal of Experimental and Theoretical Physics, vol. 194, no. 5, pp. 675-688.