Home > Free Essays > Tech & Engineering > Computer Security > Cryptography Systems
Rate

Cryptography Systems Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: May 23rd, 2021

Quantum Cryptography for Mobile Phones by University of Bristol

This article explains that the use of modern technology has revolutionized the social, economic, and political activities of people. The increase in the sensitivity of mobile transactions and communication necessitates the need for a strong security mechanism that will protect the confidentiality of the information exchanged using these devices (University of Bristol 2014). The article describes the application of an ultra-high security scheme that is capable of using Quantum Key Distributing into mobile phones. The increased use of online platforms for banking, education, business, and political activities has raised the risks associated with this form of communication; therefore, there is the need to develop a secure way of ensuring the security of users’ information is protected. There has been an increase in the number of online attacks, fraud, and theft because most mobile phone users do not see the need to secure their devices (University of Bristol 2014). Dr. Anthony Laing argues that there is a possibility that the use of an optical chip will play significant roles in ensuring that mobile communication is secured. He believes that this will be the latest technology that will guarantee the safety of information received, stored, or send through mobile phones and other communication devices.

Vulnerability in Commercial Quantum Cryptography by Norwegian University of Science and Technology

Research conducted by the Norwegian University of Science and Technology, University of Erlangen-Nürnberg, and Max Planck Institute for the Science of Light in Erlangen exposed the weaknesses of quantum cryptography systems. These institutions used the ID Quantique products to develop and test their hypothesis. They argue that the security of information on mobile phones and other communication devices does not only rely on the laws of quantum physics, but also on the lack of weaknesses in implementing other measures that enhance the safety of information (Norwegian University of Science and Technology 2010).

References

University of Bristol. (2014). Science Daily. Web.

Norwegian University of Science and Technology. (2010). Science Daily. Web.

This essay on Cryptography Systems was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper

Select a referencing style:

Reference

IvyPanda. (2021, May 23). Cryptography Systems. Retrieved from https://ivypanda.com/essays/cryptography-systems/

Work Cited

"Cryptography Systems." IvyPanda, 23 May 2021, ivypanda.com/essays/cryptography-systems/.

1. IvyPanda. "Cryptography Systems." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.


Bibliography


IvyPanda. "Cryptography Systems." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.

References

IvyPanda. 2021. "Cryptography Systems." May 23, 2021. https://ivypanda.com/essays/cryptography-systems/.

References

IvyPanda. (2021) 'Cryptography Systems'. 23 May.

More related papers
Psst... Stuck with your
assignment? 😱
Hellen
Online
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
What type of assignment 📝 do you need?
How many pages (words) do you need? Let's see if we can help you!