Quantum Cryptography for Mobile Phones Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Quantum Cryptography for Mobile Phones by University of Bristol

This article explains that the use of modern technology has revolutionized the social, economic, and political activities of people. The increase in the sensitivity of mobile transactions and communication necessitates the need for a strong security mechanism that will protect the confidentiality of the information exchanged using these devices (University of Bristol 2014). The article describes the application of an ultra-high security scheme that is capable of using Quantum Key Distributing into mobile phones. The increased use of online platforms for banking, education, business, and political activities has raised the risks associated with this form of communication; therefore, there is the need to develop a secure way of ensuring the security of users’ information is protected. There has been an increase in the number of online attacks, fraud, and theft because most mobile phone users do not see the need to secure their devices (University of Bristol 2014). Dr. Anthony Laing argues that there is a possibility that the use of an optical chip will play significant roles in ensuring that mobile communication is secured. He believes that this will be the latest technology that will guarantee the safety of information received, stored, or send through mobile phones and other communication devices.

Vulnerability in Commercial Quantum Cryptography by Norwegian University of Science and Technology

Research conducted by the Norwegian University of Science and Technology, University of Erlangen-Nürnberg, and Max Planck Institute for the Science of Light in Erlangen exposed the weaknesses of quantum cryptography systems. These institutions used the ID Quantique products to develop and test their hypothesis. They argue that the security of information on mobile phones and other communication devices does not only rely on the laws of quantum physics, but also on the lack of weaknesses in implementing other measures that enhance the safety of information (Norwegian University of Science and Technology 2010).

References

University of Bristol. (2014). Science Daily. Web.

Norwegian University of Science and Technology. (2010). Science Daily. Web.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, May 23). Quantum Cryptography for Mobile Phones. https://ivypanda.com/essays/cryptography-systems/

Work Cited

"Quantum Cryptography for Mobile Phones." IvyPanda, 23 May 2021, ivypanda.com/essays/cryptography-systems/.

References

IvyPanda. (2021) 'Quantum Cryptography for Mobile Phones'. 23 May.

References

IvyPanda. 2021. "Quantum Cryptography for Mobile Phones." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.

1. IvyPanda. "Quantum Cryptography for Mobile Phones." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.


Bibliography


IvyPanda. "Quantum Cryptography for Mobile Phones." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.

Powered by CiteTotal, the best citation creator
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1