Computer Science – Cryptography and Security
Scientific paper
2011-12-02
Computer Science
Cryptography and Security
6 pages
Scientific paper
This paper analyzes the performance of Kak's quantum cryptography protocol
when intensity monitoring is used to detect the presence of Eve during
transmission. Some difficulties related to interception to obtain useful data
from the transmission are discussed. The analysis shows the resilience of the
protocol towards the man-in-the-middle attack.
No associations
LandOfFree
Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-697503