Sample Essay on:
Quantum Cryptography

Here is the synopsis of our sample research paper on Quantum Cryptography. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 10 page paper provides an overview of quantum cryptography. This paper relates the concept of quantum cryptography to issues of national security.

Page Count:

10 pages (~225 words per page)

File: MH11_MHCrypQu.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

encryption of data sent via computer requires a higher degree of security than ever before, and quantum cryptography is the basis for this type of security. This study considers the nature of quantum cryptography, compares it with classical cryptography and offers a reason for the use for national security. Introduction Quantum cryptography is not a new concept, but new applications in recent years suggest there is potential in this system for benefits to national security. Though quantum cryptography relates most distinctly to benefits derived from protecting transferred information via computer systems, new and varied technological systems have afforded the use of quantum technology, including quantum cryptography and quantum teleportation as a means of enhancing security in communication systems The Problem In the early years of computer network development, the most significant problems that companies faced in securing their computer systems were based on the threat of stolen computer terminals, stolen floppy disks with company information, or direct access to the network by individuals, either criminal intruders or disgruntled employees who already had access to the computer system. But as more and more companies connect the Internet, the use of extended or extranet computer technologies has created many more problems in maintaining a secure information systems network. As the intranet and extranet systems grow more complex, computer hackers and computer criminals have continued to hone their own skills, and the protection of computer networks has become a considerable challenge in light of the changing nature of computer criminals (Anthes, 1996). Just a year ago, the Pentagon provided an estimate of the level of vulnerability to talented computer criminals, and suggested that over 65% of the existing computer networks in the Federal government were open to security breaches, ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now