Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has just learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg's Uncertainty Principle, the Vernam cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve's possible eavesdropping strategies, opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.
CITATION STYLE
Lomonaco, S. J. (2000). A Talk on Quantum Cryptography or How Alice Outwits Eve. In Coding Theory and Cryptography (pp. 144–174). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-59663-6_8
Mendeley helps you to discover research relevant for your work.