A Presentation of the Prerequisite Topics and a Module for a Quantum Encryption (QE) Topic in an IS Course
نویسنده
چکیده
I present a variant of the quantum encryption (QE) algorithm and an elementary outline of the quantum mechanics (QM) axioms and math results that make it work. There are two points in the algorithm where QM plays a role. One is a quote of a deep theorem that makes acceptable sense in light of the outline of axioms. The second is only an application of vector representations in a basis. Another topic appears throughout: discrete probability. Using this insight, I present an outline of a prerequisite topic review module for an IS course introducing QE. Available by email from me are a Java console application interactive QE Simulator, and extensive slide sets on background material at various levels of difficulty. This discussion assumes some familiarity with the very basics of cryptography (one-time-pads, sending in the clear, symmetric keys etc.).
منابع مشابه
The Utilization of Web-based Continuing Medical Education Courses in Mashhad University of Medical Sciences and its Relationship with Course Characteristics
Introduction: One of the educational methods which can overcome time and distance limitations is electronic learning. Healthcare professionals, facing with such limitations, also need continuing education to keep their information up to date. This study was conducted to evaluate the utilization of electronic courses by the medical professionals in Mashhad University of Medical Sciences and its ...
متن کاملMedical Students' Viewpoints toward Clinical Physiology Presentation in Isfahan University of Medical Sciences
Introduction: To make association between basic sciences and clinical courses of medicine is an established essential, which highly contributes to a better and more accurate learning of clinical concepts and disease diagnosis and therapy among students. This study investigated medical students' viewpoints toward presentation of clinical physiology lesson. Methods: In this action research, clin...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کامل