Privacy of information is one of the utmost vital issues in the epoch of digitally advanced communication. Privacy of information can be achieved through confidentiality, which is one of the most important pillars in information security. There are varieties of protocols and algorithms either symmetric or asymmetric claiming maximum security depending on key lengths, rounds, S-boxes, etc. Modern systems are based on mathematical and logical functions, and their algorithms are based on the fundamental process of factoring large integers into their primes. With the passage of time, there have been advancements in the field to show that, if the key length is not enough, substitution boxes are not too strong, or rounds of encryption are few, then the designed encryption scheme is vulnerable to threats. We have established a scheme using quantum spinning and rotation that is applied to both symmetric and asymmetric cryptographies with minimum key space and that provides maximum security. Our scheme is purely based on rotation of phases that adds a concept in quantum cryptography. The scope of this paper is to cover the fundamental concepts of spins ½ matrices (Pauli’s matrices) and their general rotation operators as applied to asymmetric systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.