Which of the following cryptographic operations is least applicable in quantum cryptography?
A. Generate a one-time pad
B. Distribute the encryption key
C. Encrypt the plain text
D. Ensure sufficient entropy for encryption
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is C. Encrypt the plain text.
Quantum computing and Quantum cryptography are the opposite studies.
- Quantum computing may compromise public-key systems.
- Post-quantum cryptography is secure against quantum computing, aka quantum-proof, quantum-safe, or quantum-resistant.
- Quantum cryptography secures key exchange.
“Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem.” (Wikipedia)
“Last fall (2018), a team of Chinese researchers successfully used quantum-entangled photons to create and share one-time pads between a satellite and a ground station in Austria.”
In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data.
Simply put, entropy is the space (or degree) of randomness. A fair die has six possible outcomes or space, from one to six, while an unfair die may always generate the “one” side as the outcome. The space of random outcomes for a fair die is 6; an unfair die is one. In other words, a fair die has more entropy than an unfair die.
- Entropy (computing)
- Quantum computing
- Post-quantum cryptography
- Quantum cryptography (Wikipedia)
- Quantum cryptography definition
- Quantum Cryptography vs Post-Quantum Cryptography
- New Encryption System Protects Data from Quantum Computers
- Post-Quantum Cryptography Standardization
- Quantum Encryption – A Means to Perfect Security?
- Quantum Cryptography Demystified: How It Works in Plain Language
A BLUEPRINT FOR YOUR SUCCESS IN CISSP
My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and an informative reference for security professionals.
A. 生成一次性墊 (one-time pad)