Taking a Look at Quantum Cryptography
Introduction
All our classical computer cryptography methods are basically based on some mathematical calculations which are quiet easy to implement in one direction but very difficult to process in the other direction. As RSA(RivestShamirAdleman) algorithm which is one of the first practicable and most famous publickey cryptosystems, RSA, is based on the technique of factoring large numbers which makes it secure. Difficulty in factoring increases with number of digits in RSA key. For example, a 128 digit number would take millions of years to factor with current computers.
There are still limitations in classical cryptography, it is purely mathematical and information cannot be separated from its physical representation. In Classical physics, we use binary form to store and process the data. In the 1980s, C.Bennet, P.Benioff, R.Feynman and others observed that new and very powerful ways of information processing are possible with quantum mechanical systems. This gave birth to the concept of quantum computing.
We have algorithms such as Shor’s Algorithm, a quantum computer can break a very large number into its prime factors otherwise which could take millions of years to be solved. The day when quantum cryptography will become a reality, above…

Taking a Look at DNA Supercoiling
684 Words  3 Pagesinvolved in DNA coiling are quantum mechanics and statistical mechanics. Quantum physics is a branch of physics that explores certain units of energy, which are called quanta. These units of energy are described by the Quantum Theory. The dictionary definition of the Quantum Theory is: “Any theory predating quantum mechanics that encompassed Planck’s radiation formula and a scheme for obtaining discrete energy states for atoms, as Bohr theory.” This definition means that Quantum Theory deals with Planck’s…

Taking a Look Distracted Driving
603 Words  2 Pagestechnology, eating and drinking, and children in the backseat. The top cause of car accidents currently is because of technology. Cellphones are the main technology that distracts drivers. Drivers usually have the tendency to want to answer a call or look down at the phone to read a text message and it is of constant habit, but in those tiny seconds an accident is bound to occur. According to the survey of 800 teenagers the Pew Research Center’s Internet and American Life Project conducted 34% of teen…

A Brief Look at Quantum Optics
694 Words  3 PagesQuantum optics tells us that left (l) and right (r)circularly polarized (CP) photon conveys "integer" spin angular momentum, +ℏ and –ℏ, respectively, although photon is massless elemental particle. The nature of "integer" spin obeying BoseEinstein statics makes plural spins confine in an ultrasmall temporalspace with the same quantum state, meanwhile, "half integer" spin like electron denies to share the same quantum state in a molecular space, wellknown as Pauli exclusion principle. Intense…

Taking a Look at Narcissism
1172 Words  5 Pagesthey look at their selfies, they can see their fun, silly or crazy side. Taking selfies can be seen as a creative activity for people to acknowledge their hidden sides. I see no connection between selfie and narcissism. Critics try too hard to criticize Generation Y. From the article “Selfies are proof of a culture of narcissism” by Andrew Cohen, Calgary Herald; the author stated that “Today, our currency is self aggrandizement. On Facebook, Instagram, Flickr and Twitter, we shout: “Look at me…

A Closer Look At Cryptography Essay
2032 Words  9 PagesA Closer Look At Cryptography Ever since the earliest days of writing, people have had reasons to limit their information to a restricted group of people. Because of this, these people have had to develop ideas of making their information unable to be read by unwanted people. The general techniques used to hide the meaning of messages constitute the study known as cryptography. "Ciphers, in general fall into three major classifications: 1. Concealment Cipher, 2. Transposition Cipher, and 3.…

On the Development of Quantum Computers and Cryptography
1383 Words  6 PagesDevelopment of Quantum Computers and Cryptography In 2010, the United States government, after accessing encrypted files by means of physical intervention, exposed ten Russian sleeper agents; in 2013, the United States government, without any means of physical intervention, surreptitiously collected and promptly decrypted many previously encrypted (Wood). Within this decade, concerns regarding the dubious security of contemporary cryptography will begin to emerge as the secrets of quantum computing…

Taking a Look at VastuShastra
2424 Words  10 Pagescombination of two words i.e. Vas meaning to live and astu meaning in this way. the practical meaning and application of VastuShastra is to build a positive environment that is worth living. VastuShastra is nothing but creating an environment by taking benefits bestowed by the five elements called PanchMahaBhootas of the nature. Human being is made of these five elements, the origination begins from the earth, then one enjoys other elements like water, air, space, fire, after living their live…

Taking a Look at the Bitcoin
1561 Words  6 Pagesaspects of the virtual currency, though the fluctuation in price of Bitcoin has been very difficult to determine. This research paper look analyzes some of the issues that must be addressed to ensure the future of Bitcoin. Introduction The first form of cyptocurrency, Bitcoins are the first type of digital currency that is both created and subsequently managed by cryptography, rather than a central authority (Kinsella 2013). The Bitcoin architecture was outlined in a research paper by Satoshi Nakamoto…

Taking a Look at Quantum Dots
1836 Words  7 Pageslanguage or maybe for a person who has limited or little knowledge about physics, quantum dots are materials that are small but are sufficient to exhibit quantum mechanical properties. Quantum dots were first discovered in 1980. They exhibit electronic properties which are between semiconductors and discrete molecules. That is the very reason for the unusually high surface to volume ratio. The most visible use of quantum dots is in fluorescence where the nanocrystal is capable of producing different…

Taking a Look at Bitcoin
2739 Words  11 Pagesalgorithms used to make digital signature protected. 1) Elliptic Curve DSA 2) Mathematical Trap Door Elliptic Curve DSA: Elliptic Curve Digital signature Algorithm offers different types of DSAs which are based on elliptic curve cryptography which uses public key cryptography based on the algebraic structure of elliptic curves over finite fields. Mathematical Trap Door A mathematical trapdoor function is a function which is easy to calculate in one direction but tedious to calculate in the opposite…
More about Taking a Look at Quantum Cryptography

Taking a Look at DNA Supercoiling
684 Words  3 Pages 
Taking a Look Distracted Driving
603 Words  2 Pages 
A Brief Look at Quantum Optics
694 Words  3 Pages 
Taking a Look at Narcissism
1172 Words  5 Pages 
A Closer Look At Cryptography Essay
2032 Words  9 Pages 
On the Development of Quantum Computers and Cryptography
1383 Words  6 Pages 
Taking a Look at VastuShastra
2424 Words  10 Pages 
Taking a Look at the Bitcoin
1561 Words  6 Pages 
Taking a Look at Quantum Dots
1836 Words  7 Pages 
Taking a Look at Bitcoin
2739 Words  11 Pages