Contributed by Curby Simerson
In a networked environment, hosts exchange data at, sometimes, near the speed of light. Even with this speed, an interceptor with minimum effort can easily find himself in the possession of someone else’s information. To that end, users must insure that it is protected by all means. In this document, the technique of cryptography is explored and discussed at a low level to include algorithmic methods and various versions. More specifically, quantum cryptography will be discussed at first from its inception, its categories and families of protocols, and then disclosing the latest findings and information on this innovative technology.
This document is in PDF format. To view it click here.