Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Commercial Information Technology

Cryptography and Quantum Computing: Securing Business Information

Title: Cryptography and Quantum Computing: Securing Business Information

Scientific Study , 2004 , 16 Pages , Grade: A 4.00

Autor:in: Professor Bradley Tice (Author)

Computer Science - Commercial Information Technology
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

The dissertation will examine the nature of quantum computing and quantum cryptography for the private sector as it relates to the use of 'secure storage and transmission' of business information.

Excerpt


Table of Contents

Introduction

The Review of Literature

Quantum Computing

Cryptography and the Quantum Gate

Cryptography and the Qutrit

Conclusion

Summary

Objectives and Topics

This dissertation aims to explore the integration of cryptography within quantum computing frameworks to establish highly secure methods for the storage and transmission of sensitive business information. By leveraging theoretical models of quantum mechanics, the research seeks to overcome traditional data security challenges.

  • Theoretical foundations of quantum computing and information security.
  • Utilization of Pauli gate matrices for encryption.
  • Application of qutrit-based ternary systems for data encoding.
  • Methods for enhancing message security through repetition and redundancy.
  • Historical evolution of coding machines from the Enigma to quantum systems.

Excerpt from the Book

Cryptography and the Quantum Gate

The quantum gate is a reversible ‘logic’ gate that uses a ‘qubit’ as its basic unit of measure (Wikipedia 2012a, 1-2). Like the nomenclature of a binary system that uses the ‘bit’ as representing the basic unit of that system the ‘qubit’ is a reversible system of simultaneous states (Wikipedia, 2012a, 1- 2). The Pauli X gate is a common gate found in quantum computing and employs a single qubit in the Pauli X matrix that has as its 4 character form a 0 to 1 and a 1 to 0 matrix (Wikipedia, 2012a, 2).

The use of repetition in cryptography is quite old and is used to ‘deceive’ the interceptor of the code by allowing for ‘too much information’ in the coded message and hence, provide an ‘extraneous’ amount of information to decode. The number of characters used in the code can be increased along with the chromatic aspects of the message, from simple black and white to color, and that can impart more states that the original information had to add to the ‘amount’ of information to be ‘decoded’.

Summary of Chapters

Introduction: Outlines the historical context of machine coding and establishes the need for advanced cryptographic methods in business communications.

The Review of Literature: Provides an overview of foundational research in cryptography, statistical communication theory, and early quantum computing developments.

Quantum Computing: Details the fundamental principles of qubits, superposition, and the role of quantum logic gates in processing data.

Cryptography and the Quantum Gate: Explores the practical application of Pauli gate matrices (X, Y, and Z) to create secure, reversible encoding mechanisms.

Cryptography and the Qutrit: Examines ternary systems (three-state logic) and their potential to increase information density and security in coded messages.

Conclusion: Synthesizes the proposed theoretical models for using repetition and redundancy in quantum-based encryption for future business applications.

Summary: Recaps the research findings and acknowledges the current theoretical state of quantum computing while emphasizing its future potential for secure communication.

Keywords

Cryptography, Quantum Computing, Business Information, Qubit, Qutrit, Pauli Gate, Data Security, Information Transmission, Coding, Redundancy, Repetition, Encryption, Ternary System, Quantum Logic, Information Theory.

Frequently Asked Questions

What is the fundamental purpose of this research?

The dissertation investigates how quantum computing can be utilized to improve the security of business information storage and transmission by applying cryptographic techniques.

What are the primary subject areas covered in this work?

The work covers quantum mechanics as applied to computing, the history of cryptographic ciphers, the functionality of quantum logic gates, and ternary information systems.

What is the central research goal?

The goal is to propose theoretical models that use qubits and qutrits to design secure transmission cells through data duplication and redundancy.

Which scientific methods are employed?

The author uses a theoretical analysis of mathematical matrices, specifically Pauli gate matrices, and applies communication theory to describe new coding paradigms.

What is discussed in the main body of the text?

The text focuses on the mechanics of Pauli X, Y, and Z gates, the concept of the 'qutrit', and how repetition can be used to obfuscate information from unauthorized interceptors.

Which keywords best describe this study?

The study is characterized by terms such as Quantum Cryptography, Qubits, Qutrits, Pauli Matrices, and Secure Business Communication.

How do Pauli gates function in the context of this encryption model?

Pauli gates act as reversible logic units that manipulate qubits; by creating modified matrices, the author demonstrates how to encode data in a way that provides redundancy.

Why does the author advocate for the use of qutrits?

Qutrits are advocated because they represent a ternary (three-state) system, which potentially increases the complexity and the amount of information contained within a coded message compared to standard binary systems.

Excerpt out of 16 pages  - scroll top

Details

Title
Cryptography and Quantum Computing: Securing Business Information
Course
Business
Grade
A 4.00
Author
Professor Bradley Tice (Author)
Publication Year
2004
Pages
16
Catalog Number
V205473
ISBN (eBook)
9783656351214
ISBN (Book)
9783656351948
Language
English
Tags
cryptography quantum computing securing business information
Product Safety
GRIN Publishing GmbH
Quote paper
Professor Bradley Tice (Author), 2004, Cryptography and Quantum Computing: Securing Business Information, Munich, GRIN Verlag, https://www.grin.com/document/205473
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  16  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint