15-11-2012, 02:09 PM
Exploration of Quantum Cryptography in Network Security
Exploration of Quantum.pdf (Size: 3.47 MB / Downloads: 82)
Abstract
Threats and attacks to information systems security on digital
network environment are growing rapidly, putting pressure on
businesses to protect their tangible and intangible assets.
It is reported that 75% of surveyed organizations have
confronted different network security attacks. For that reason,
cryptography is a vital of today’s computer and
communications networks, protecting everything from
business e-mail to bank transactions and internet shopping.
But the scholars argue that, the current encryption algorithms based on
mathematical model introduce potential security holes related to the key
refresh rate and key expansion ratio, the most crucial parameters in the
security of any cryptographic techniques.
These cryptographic techniques are widely used but are not proved to be
completely secure, representing one of the main threats to modern network
communication systems.
For past decade efforts have been made to establish new foundation for
cryptography science in the computer communications networks.
One of these efforts has led to the development of quantum cryptography
technology, whose security relies on the laws of quantum mechanics.
Understand the goals of network security
Network security
It is a process by which digital information assets are
protected
Goals
Maintain integrity (data is not altered or destroyed )
Protect confidentiality (Protection of data from unauthorized )
Assure availability (Continuous operation of network)
Determine the factors involved in a secure network strategy
Analysis both internal and external threats
Define & enforce policies and procedures
Reduce risk across perimeter security, the Internet,
intranets, Extranet, and LANs Human factors
Risk Assessment (Know your weakness)
Limit access
Achieve security through continuous process
Remember physical security
Vulnerabilities/Weakness to the modern/classical cryptography
Current encryption algorithms based on mathematical model introduce
potential security holes related to the key refresh rate and key expansion
ratio.
There are three main problems with encryption schemes.
The first is key distribution, which must be in itself, the second is key
management, where the number of keys required in a system with a large
number of principals does not scale well.
Thirdly as computing power increases, and new classical computational
techniques are developed, the length of time that a message can be
considered secure will decrease, and numerical keys will no longer be
able to provide acceptable levels of secure communications