A Design of Secure Communication Architecture Applying Quantum Cryptography

Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography s...

Full description

Bibliographic Details
Main Authors: Kyu-Seok Shim, Yong-Hwan Kim, Wonhyuk Lee
Format: Article
Language:English
Published: Korea Institute of Science and Technology Information 2022-06-01
Series:Journal of Information Science Theory and Practice
Subjects:
Online Access:https://data.doi.or.kr/10.1633/JISTaP.2022.10.S.12