Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography
Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digi...
Gespeichert in:
Veröffentlicht in: | International journal of computer applications 2010-02, Vol.1 (26), p.59-64 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 64 |
---|---|
container_issue | 26 |
container_start_page | 59 |
container_title | International journal of computer applications |
container_volume | 1 |
creator | Vignesh, R Sakthi Sudharssun, S Jegadish kumar, K J |
description | Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pursue with the discussion about the potency of classical cryptography and its splendid capabilities in providing security. |
doi_str_mv | 10.5120/479-786 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671517847</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2200762231</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1256-75b986ca62da8314239a20f63dc201b2c64cf98b77d9da0c013764a520cf26bf3</originalsourceid><addsrcrecordid>eNpdkU1LxDAQhoMouKyLfyF4WS_VfLT5OC5l_YAFFfQc0jTd7dImNWkPC_54I-vBdS4zh2eGl3kAuMborsAE3edcZlywMzBDkheZEIKf_5kvwSLGPUpFJWEyn4Gv0rvR9oMPOhxgGQ7D6LdBD7sD1K6Gq7CdeuvGCBsfYNnpGFujuxNwGeHa1VPQzlioO--2sa0tHHcWvgY_tGPrpwjfJu3GqT_ZvAIXje6iXfz2Ofh4WL-XT9nm5fG5XG0yg0nBMl5UUjCjGam1oDgnVGqCGkZrQxCuiGG5aaSoOK9lrZFBmHKW64Ig0xBWNXQObo93h-A_JxtH1bfR2K7TzqZsCjOOC8xFzhN68w_d-ym4lE4JnAuMKCkStDxCJvgYg23UENo-PVBhpH48qORBJQ_0G2eEe6A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>814810325</pqid></control><display><type>article</type><title>Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Vignesh, R Sakthi ; Sudharssun, S ; Jegadish kumar, K J</creator><creatorcontrib>Vignesh, R Sakthi ; Sudharssun, S ; Jegadish kumar, K J</creatorcontrib><description>Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pursue with the discussion about the potency of classical cryptography and its splendid capabilities in providing security.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/479-786</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Algorithms ; Computer information security ; Cryptography ; Digital signatures ; Durability ; Endurance ; Mathematical models ; Quantum cryptography ; Real time</subject><ispartof>International journal of computer applications, 2010-02, Vol.1 (26), p.59-64</ispartof><rights>Copyright Foundation of Computer Science 2010</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Vignesh, R Sakthi</creatorcontrib><creatorcontrib>Sudharssun, S</creatorcontrib><creatorcontrib>Jegadish kumar, K J</creatorcontrib><title>Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography</title><title>International journal of computer applications</title><description>Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pursue with the discussion about the potency of classical cryptography and its splendid capabilities in providing security.</description><subject>Algorithms</subject><subject>Computer information security</subject><subject>Cryptography</subject><subject>Digital signatures</subject><subject>Durability</subject><subject>Endurance</subject><subject>Mathematical models</subject><subject>Quantum cryptography</subject><subject>Real time</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><recordid>eNpdkU1LxDAQhoMouKyLfyF4WS_VfLT5OC5l_YAFFfQc0jTd7dImNWkPC_54I-vBdS4zh2eGl3kAuMborsAE3edcZlywMzBDkheZEIKf_5kvwSLGPUpFJWEyn4Gv0rvR9oMPOhxgGQ7D6LdBD7sD1K6Gq7CdeuvGCBsfYNnpGFujuxNwGeHa1VPQzlioO--2sa0tHHcWvgY_tGPrpwjfJu3GqT_ZvAIXje6iXfz2Ofh4WL-XT9nm5fG5XG0yg0nBMl5UUjCjGam1oDgnVGqCGkZrQxCuiGG5aaSoOK9lrZFBmHKW64Ig0xBWNXQObo93h-A_JxtH1bfR2K7TzqZsCjOOC8xFzhN68w_d-ym4lE4JnAuMKCkStDxCJvgYg23UENo-PVBhpH48qORBJQ_0G2eEe6A</recordid><startdate>20100225</startdate><enddate>20100225</enddate><creator>Vignesh, R Sakthi</creator><creator>Sudharssun, S</creator><creator>Jegadish kumar, K J</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>FR3</scope><scope>KR7</scope></search><sort><creationdate>20100225</creationdate><title>Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography</title><author>Vignesh, R Sakthi ; Sudharssun, S ; Jegadish kumar, K J</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1256-75b986ca62da8314239a20f63dc201b2c64cf98b77d9da0c013764a520cf26bf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Algorithms</topic><topic>Computer information security</topic><topic>Cryptography</topic><topic>Digital signatures</topic><topic>Durability</topic><topic>Endurance</topic><topic>Mathematical models</topic><topic>Quantum cryptography</topic><topic>Real time</topic><toplevel>online_resources</toplevel><creatorcontrib>Vignesh, R Sakthi</creatorcontrib><creatorcontrib>Sudharssun, S</creatorcontrib><creatorcontrib>Jegadish kumar, K J</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vignesh, R Sakthi</au><au>Sudharssun, S</au><au>Jegadish kumar, K J</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography</atitle><jtitle>International journal of computer applications</jtitle><date>2010-02-25</date><risdate>2010</risdate><volume>1</volume><issue>26</issue><spage>59</spage><epage>64</epage><pages>59-64</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. We present here some of the quantum's theoretical weaknesses like lack of digital signatures (or any algorithm) along with its many real time implementation problems. We further pursue with the discussion about the potency of classical cryptography and its splendid capabilities in providing security.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/479-786</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2010-02, Vol.1 (26), p.59-64 |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1671517847 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Computer information security Cryptography Digital signatures Durability Endurance Mathematical models Quantum cryptography Real time |
title | Contemporary Cryptography and Arguments for Classical Cryptography's Endurance alongside the Propitious Quantum Cryptography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T22%3A27%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Contemporary%20Cryptography%20and%20Arguments%20for%20Classical%20Cryptography's%20Endurance%20alongside%20the%20Propitious%20Quantum%20Cryptography&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Vignesh,%20R%20Sakthi&rft.date=2010-02-25&rft.volume=1&rft.issue=26&rft.spage=59&rft.epage=64&rft.pages=59-64&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/479-786&rft_dat=%3Cproquest_cross%3E2200762231%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=814810325&rft_id=info:pmid/&rfr_iscdi=true |