Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Quantum Cryptography for Mobile Phones by University of Bristol
This article explains that the use of modern technology has revolutionized the social, economic, and political activities of people. The increase in the sensitivity of mobile transactions and communication necessitates the need for a strong security mechanism that will protect the confidentiality of the information exchanged using these devices (University of Bristol 2014). The article describes the application of an ultra-high security scheme that is capable of using Quantum Key Distributing into mobile phones. The increased use of online platforms for banking, education, business, and political activities has raised the risks associated with this form of communication; therefore, there is the need to develop a secure way of ensuring the security of users’ information is protected. There has been an increase in the number of online attacks, fraud, and theft because most mobile phone users do not see the need to secure their devices (University of Bristol 2014). Dr. Anthony Laing argues that there is a possibility that the use of an optical chip will play significant roles in ensuring that mobile communication is secured. He believes that this will be the latest technology that will guarantee the safety of information received, stored, or send through mobile phones and other communication devices.
Vulnerability in Commercial Quantum Cryptography by Norwegian University of Science and Technology
Research conducted by the Norwegian University of Science and Technology, University of Erlangen-Nürnberg, and Max Planck Institute for the Science of Light in Erlangen exposed the weaknesses of quantum cryptography systems. These institutions used the ID Quantique products to develop and test their hypothesis. They argue that the security of information on mobile phones and other communication devices does not only rely on the laws of quantum physics, but also on the lack of weaknesses in implementing other measures that enhance the safety of information (Norwegian University of Science and Technology 2010).
References
University of Bristol. (2014). “Quantum cryptography for mobile phones.”Science Daily. Web.
Norwegian University of Science and Technology. (2010). “Vulnerability in commercial quantum cryptography.”Science Daily. Web.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.