Please use this identifier to cite or link to this item: https://dspace.univ-ouargla.dz/jspui/handle/123456789/7832
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRima DJELLAB, Mohamed BENMOHAMMED-
dc.date.accessioned2014-11-18T14:11:01Z-
dc.date.available2014-11-18T14:11:01Z-
dc.date.issued2014-11-18-
dc.identifier.issndmz-
dc.identifier.urihttp://dspace.univ-ouargla.dz/jspui/handle/123456789/7832-
dc.description2émes journées internationales de chimie organométallique et catalyse jicoc’2014en_US
dc.description.abstractCryptography seems to be the main solution to secure information. In the taxonomy of cryptographic algorithm, two categories are distinguished, symmetric and asymmetric algorithm. In the first case only one key is used to encrypt and decrypt data. Whist the asymmetric algorithm uses a pair of keys, respectively, to encrypt and decrypt data. In both case, the main issue is how to distribute the key in a secure manner so that it can be used for encryption concerns. In this paper, we will review the key distribution issues in both cases (symmetric and asymmetric). We will present the vulnerabilities of classical key distribution techniques and then introduce the concept of quantum key distribution (QKD) by presenting the BB84 standard and some of its applications.en_US
dc.language.isoenen_US
dc.relation.ispartofseries2014;-
dc.subjectsecurityen_US
dc.subjectcryptographyen_US
dc.subjectkey distributionen_US
dc.subjectquantumen_US
dc.subjectBB84en_US
dc.titleA Survey of Key distribution issue: from classical to quantum solutionen_US
dc.typeArticleen_US
Appears in Collections:1. Faculté des mathématiques et des sciences de la matière

Files in This Item:
File Description SizeFormat 
icaiit2014_submission_30.pdf574,52 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.