The Repository @ St. Cloud State

Open Access Knowledge and Scholarship

Date of Award

5-2017

Culminating Project Type

Starred Paper

Degree Name

Information Assurance: M.S.

Department

Information Assurance and Information Systems

College

Herberger School of Business

First Advisor

Dennis Guster

Second Advisor

Renat Sultanov

Third Advisor

Balasubramanian Kasi

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Keywords and Subject Headings

quantum computing, Quantum encryption, Hybrid quantum algorithm

Abstract

In the world of computation and digital communications the digital world is currently lacking in ‘security.' Yes, security is a feature that can never be attained one hundred percent. However, to ensure secure data we can use huge numbers and large cryptographic keys in combination with a statistical algorithm so that deceiving or decryption of information would become very difficult. The question then becomes what if someone reaches a level in computational speed like none other with the support of advanced chip technology and cracks all the available mathematical algorithms built in combination with the available cryptographic keys? Then the world of digital computation, which makes us feel secure, becomes at risk. Recent research and achievements in advanced technology, especially in Quantum Computation and Encryption, are ringing danger bells towards conventional computational security methodologies. In this paper, I will discuss current security trends, advancements in quantum computation and traditional computation security methods that feel insecure and discuss a new methodology that uses the spin rotation of photons to add the power of quantum mechanics to classical encryption algorithms to insure a balanced key generation.

Comments/Acknowledgements

This research paper about designing and implementing Quantum security, a hybrid quantum algorithm was undertaken using the resources provided by the Business Computing Research Laboratory of St. Cloud State University and special thanks to Dr.Guster for his greatest support.

Share

COinS